Building CLIs in #Deno is productive and simple with: ✅ built-in tooling ✅ web platform APIs & browser methods ✅ `deno compile` into a cross-platform binary
@tassoman@deno_land Exactly. This vulnerability is so 20 years ago. It makes me wonder if people who build Deno actually build applications with it, or if any of their clients are building things that matter. Whichever big company chooses Deno and then gets hit with it first is gonna be majorly pissed. I can see the Hacker News articles already.
You can check your self, by just giving a search on Github. Everyone can search for #Deno inside package.json and for fetch (or what the hell is that) inside sources. Just don’t be malicious.
@tassoman@deno_land Deno doesn't use a package.json. There's probably some other way to search for it. Maybe "deno.land/x/" which is used in import URLs.
I think it's at least vulnerable to DNS poisoning. fetching by IP address could be a mitigation. I don't know about how would deal with HTTP redirects. If it follows, well ...
A good security audit would never let this pass, at least here in Europe where we have security concern for remote fetching Google Fonts and CDN scripts