The Packagist API allows providing a URl to dynamically fetching security advisories. https://packagist.org/apidoc#list-security-advisories. I believe this is used by Composer Audit
From a TUF perspective this is not good because the dynamic nature of the possible query arguments probably makes it impossible to protect as a TUF resource.
We should determine if it possible to make composer audit rely on resources that can be TUF protected
- When does Composer call dynamic security advisories query?
- Is possible to tell Composer not to use these requests on certain repos?
- If 2) is not possible, is it possible to intercept and forid these call on TUF protect resources?
- If we do 3) will
audit and any other Composer operation fallback to using the security advisories in the .json files for packages? Is this the same information in just different form?
related drupal.org issue https://www.drupal.org/project/project_composer/issues/3301876
The Packagist API allows providing a URl to dynamically fetching security advisories. https://packagist.org/apidoc#list-security-advisories. I believe this is used by Composer Audit
From a TUF perspective this is not good because the dynamic nature of the possible query arguments probably makes it impossible to protect as a TUF resource.
We should determine if it possible to make
composer auditrely on resources that can be TUF protectedauditand any other Composer operation fallback to using the security advisories in the .json files for packages? Is this the same information in just different form?related drupal.org issue https://www.drupal.org/project/project_composer/issues/3301876