Ruby Conf Australia 2013

Videos provided by Ruby Conf Australia via their YouTube Channel

What's the worst that could happen if your app has a dependency on a malicious gem? How easy would it be to write a gem that could compromise a box? Much of the Ruby community blindly trusts our gems. This talk will make you second guess that trust. It will also show you how to vet gems that you do choose to use. There are four malicious gems I will be presenting: Harvesting passwords from requests going through a Rails app Exposing the contents of a Rails app's database Compromising the source code of a Rails app Providing SSH access to a box a 'gem install' time and stealing gem cutter credentials (and going viral) My talk will increase awareness that these sort of gems can exist in the wild, show how easy it is for anyone to build malicious gems, and give easy techniques for identifying these gems.

Rated: Everyone
Viewed 347 times
Tags: There are no tags for this video.