Article Details

Scrape Timestamp (UTC): 2025-07-23 09:34:47.698

Source: https://thehackernews.com/2025/07/google-launches-oss-rebuild-to-expose.html

Original Article Text

Click to Toggle View

Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages. Google has announced the launch of a new initiative called OSS Rebuild to bolster the security of the open-source package ecosystems and prevent software supply chain attacks. "As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers," Matthew Suozzo, Google Open Source Security Team (GOSST), said in a blog post this week. The project aims to provide build provenance for packages across the Python Package Index (Python), npm (JS/TS), and Crates.io (Rust) package registries, with plans to extend it to other open-source software development platforms. With OSS Rebuild, the idea is to leverage a combination of declarative build definitions, build instrumentation, and network monitoring capabilities to produce trustworthy security metadata, which can then be used to validate the package's origin and ensure it has not been tampered with. "Through automation and heuristics, we determine a prospective build definition for a target package and rebuild it," Google said. "We semantically compare the result with the existing upstream artifact, normalizing each one to remove instabilities that cause bit-for-bit comparisons to fail (e.g., archive compression)." Once the package is reproduced, the build definition and outcome is published via SLSA Provenance as an attestation mechanism that allows users to reliably verify its origin, repeat the build process, and even customize the build from a known-functional baseline. In scenarios where automation isn't able to fully reproduce the package, OSS Rebuild offers a manual build specification that can be used instead. OSS Rebuild, the tech giant noted, can help detect different categories of supply chain compromises, including - Besides securing the software supply chain, the solution can improve Software Bills of Materials (SBOMs), speed up vulnerability response, strengthen package trust, and eliminate the need for CI/CD platforms to be in charge of an organization's package security. "Rebuilds are derived by analyzing the published metadata and artifacts and are evaluated against the upstream package versions," Google said. "When successful, build attestations are published for the upstream artifacts, verifying the integrity of the upstream artifact and eliminating many possible sources of compromise."

Daily Brief Summary

MALWARE // Google Initiates OSS Rebuild for Open-Source Security Enhancement

Google has launched OSS Rebuild, aiming to enhance the security of open-source packages and protect against software supply chain attacks.

OSS Rebuild provides security metadata to validate the origin of packages and confirm that they have not been altered, contributing to safer software dependencies.

The project targets packages from major registries such as the Python Package Index, npm, and Crates.io, with plans to expand further.

It employs declarative build definitions, build instrumentation, and network monitoring to recreate package builds and compare them with existing artifacts.

OSS Rebuild uses SLSA Provenance to publish build definitions and outcomes, allowing for the verification of package origins and the repeatability of secure builds.

The solution aids in detecting compromises within the supply chain, enhancing Software Bills of Materials, accelerating vulnerability responses, and reinforcing trust in packages.

Whenever automatic reproduction of a package fails, OSS Rebuild provides a manual build specification to maintain security standards.

This initiative reduces the dependency on CI/CD platforms for managing package security, shifting the control back to security teams and developers.