☕ Apple and Microsoft Hacked?
A researcher breached over 35 major tech companies exploiting a bug in common packet managers. We discuss how the bug works. Plus, a google interview question!
Hope you’re all having a great day!
Here’s your Interview Problem, Yesterday’s Solution and Tech Snippets for the day!
Loopholes in Dependency Managers exploited at Apple, Microsoft, Shopify, and dozens of other tech companies
Alex Birsan, a security researcher, earned over $150,000 in bug bounties by exploiting loopholes in package managers like NPM and pip.
Exploiting dependencies is a common method of attack. Examples include…
Typosquatting - create packages that are typos of popular package names and include malicious code inside.
Use after Free - find packages that no longer exist (have been removed from the package registry) and create a package with the same name. Put malicious code inside.
Social Engineering - become a maintainer of a popular package that no longer has a maintainer. Upload malicious code.
Alex Birsan was observing one of PayPal’s
package.jsonfiles and noticed that PayPal was using a mix of public and private packages. The private packages were internal to PayPal and didn’t exist on NPM registry.
He uploaded Node packages to the NPM registry using the same name as these private packages, testing if npm would install his public package in PayPal’s codebase by default.
The attack worked and various codebases at tons of Big Tech companies installed his “malicious” packages. Birsan would do this by checking the GitHub repos for these companies, looking for
package.jsonfiles that listed the names of private packages.
Birsan was able to replicate the attack with Ruby, by creating a fake Ruby gem and using it to infiltrate Shopify.
The attack also works with Python’s
pipfirst checks if the library exists on the specified internal package index.
pipchecks if the library exists on the public package index (PyPI).
pipthen defaults to installing the package with the higher version number.
You can exploit this by uploading a package with a version number of 9000 or some absurdly high number.
JFrog, a DevOps platform that includes a package repository, was also affected.
Sebastian published a new episode of Coding Adventures, where he builds a Chess AI from scratch.
Past, Present, and Future of React State Management - A great blog post summarizing the state of state management in React!
Given two integers representing the numerator and denominator of a fraction, return the fraction in string format.
If the fractional part is repeating, then enclose the repeating part in parentheses.
If multiple answers are possible, return any of them!
Input: num = 2, denom = 3
Input: num = 1, denom = 2
Input: num = 2, denom = 1
We’ll send a detailed solution tomorrow, so make sure you move our emails to primary, so you don’t miss them!
Gmail users—move us to your primary inbox
On your phone? Hit the 3 dots at the top right corner, click "Move to" then "Primary"
On desktop? Back out of this email then drag and drop this email into the "Primary" tab near the top left of your screen
Apple mail users—tap on our email address at the top of this email (next to "From:" on mobile) and click “Add to VIPs”
As a refresher, here’s the previous question
You are given a linked list as input.
Reverse the nodes in the linked list in groupings of k, where k is an integer that will be provided.
k is a positive integer and will be less than or equal to the length of the linked list.
If the number of nodes is not a multiple of k, then left-out nodes, at the end, should remain as they are.
Input - 1 -> 2 -> 3 -> 4 -> 5, k = 2
Output - 2 -> 1 -> 4 -> 3 -> 5
Input - 1 -> 2 -> 3 -> 4 -> 5, k = 3
Output - 3 -> 2 -> 1 -> 4 -> 5
One really important concept to understand with linked lists is a sentinel node.
A sentinel node is a dummy node that goes at the front of the linked list.
So we first create a sentinel node (dummy node) that points to the head.
Then, we’ll iterate through the linked list and count
k nodes. This becomes our first
k group of nodes that we have to reverse.
We’ll create two pointers to keep track of the k group, one
left pointer and a
left pointer is initialized to the start of our linked list and the
right pointer is initialized to the
Then, we reverse the nodes between the
After, we reset the
left pointer to be equal to the start of the next
k group and we repeat the process by iterating over the next
Can you analyze the time/space complexity of our solution?
Reply back with your estimate!
We’ll tell you if you’re correct (or we’ll tell you the answer if you’re wrong).