Thanks to visit codestin.com
Credit goes to github.com

Skip to content

ENH: Add month cooldown window for new package uploads#162

Merged
tupui merged 3 commits intomainfrom
feat/add-exclude-newer
Apr 20, 2026
Merged

ENH: Add month cooldown window for new package uploads#162
tupui merged 3 commits intomainfrom
feat/add-exclude-newer

Conversation

@matthewfeickert
Copy link
Copy Markdown
Member

@matthewfeickert matthewfeickert commented Apr 20, 2026

  • To weakly guard against security issues that are introduced in new uploads to conda-forge, add a 30 day exclusion window for Pixi's resolver.
  • This feature was introduced in Pixi v0.67.0, so require at least that for use.
  • Update anaconda-client to v1.14.1.

This PR is coming from the main project and not my fork so that the CI actually runs, which is important on anaconda-client updates.

* To weakly guard against security issues that are introduced in new
  uploads to conda-forge, add a 30 day exclusion window for Pixi's resolver.
* This feature was introduced in Pixi v0.67.0, so require at least that for use.
@matthewfeickert matthewfeickert self-assigned this Apr 20, 2026
@matthewfeickert matthewfeickert marked this pull request as ready for review April 20, 2026 09:58
@matthewfeickert
Copy link
Copy Markdown
Member Author

@scientific-python/nightly-wheels-developers this is ready for review.

@matthewfeickert matthewfeickert changed the title ENH: Add month cooldown window for new packages ENH: Add month cooldown window for new package uploads Apr 20, 2026
@hugovk
Copy link
Copy Markdown

hugovk commented Apr 20, 2026

  • To weakly guard against security issues that are introduced in new uploads to conda-forge, add a 30 day exclusion window for Pixi's resolver.

On the contrary, this can be very effective.

For example, of the 10 attacks in the chart at https://blog.yossarian.net/2025/11/21/We-should-all-be-using-dependency-cooldowns, seven were taken down in under 24 hours. The others were 3 and 10 days, and 5 weeks.

Copy link
Copy Markdown

@lucascolley lucascolley left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks Matthew!

@tupui tupui merged commit e76cfec into main Apr 20, 2026
2 checks passed
@tupui tupui deleted the feat/add-exclude-newer branch April 20, 2026 10:37
@matthewfeickert
Copy link
Copy Markdown
Member Author

Thanks for the fast review, all!

On the contrary, this can be very effective.

I agree @hugovk. My thoughts are more along this section from the blog

Cooldowns are, obviously, not a panacea: some attackers will evade detection, and delaying the inclusion of potentially malicious dependencies by a week (or two) does not fundamentally alter the fact that supply chain security is a social trust problem, not a purely technical one. Still, an 80-90% reduction in exposure through a technique that is free and easy seems hard to beat.

My main concern and motivating reason for "weakly" is that we're relying on both detection to have happened and for this to be reported and properly dealt with by conda-forge. I have no doubt that conda-forge/core takes security seriously (they obviously do), but they do emphasize

conda-forge packages are built by strangers on the internet (our wonderful feedstock maintainers!) and are not suitable for use cases that require secure software provenance.

and we currently have no way of performing automated security audits of software environments if conda packages are installed (c.f. #general > ✔ Recommendations for security audits on conda packages? @ 💬). I think that until we can overcome this last issue that we can't really say more than "weakly", even if we're doing our best.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants