Dependency Safety

How ZYBER protects against malicious packages and supply chain attacks.

The Threat

Modern development relies on thousands of dependencies. Any one could be compromised:

Attack Vector
Real-World Examples

Typosquatting

colourama instead of colorama

Account hijacking

event-stream npm incident

Malicious updates

ua-parser-js compromised release

Dependency confusion

Private package name collision

Install scripts

Arbitrary code execution on npm install

Why ZYBER Helps

When you run npm install or pip install:

Traditional Setup
ZYBER

Runs on your machine

Runs in isolated VM

Access to your files

Access to workspace only

Access to your credentials

No access to your device

Persistent malware possible

Terminated with workspace

Network access to your LAN

No access to your network

Attack Containment

Install Script Execution

Package managers execute arbitrary code during installation:

In ZYBER, these scripts run inside the workspace:

Data Exfiltration Limits

Even if a malicious package runs, it can only exfiltrate:

Data
Accessible

Workspace files

✅ Yes (but not your real files)

API keys in workspace

✅ Yes (use ephemeral sessions for sensitive keys)

Your local files

❌ No

Your browser cookies

❌ No

Your SSH keys (local)

❌ No

Your password manager

❌ No

Persistence Prevention

Malware persistence techniques don't work:

Technique
Effectiveness

Cron jobs

❌ Workspace terminated

Systemd services

❌ Workspace terminated

Shell profile modification

❌ Ephemeral: gone on termination

Binary replacement

❌ Workspace terminated

Kernel modules

❌ No kernel access

Package Registry Security

Registry Connections

Registry
Connection

npm (registry.npmjs.org)

HTTPS, verified

PyPI (pypi.org)

HTTPS, verified

crates.io

HTTPS, verified

apt repositories

HTTPS, GPG verified

Checksum Verification

Package managers verify integrity:

ZYBER doesn't modify packages, so standard verification works normally.

Use Lockfiles

Always commit lockfiles to pin exact versions:

Package Manager
Lockfile

npm

package-lock.json

yarn

yarn.lock

pip

requirements.txt with hashes

cargo

Cargo.lock

Audit Before Install

Use Ephemeral Sessions for Untrusted Code

When evaluating unknown packages:

  1. Create ephemeral workspace

  2. Install and test package

  3. Terminate workspace

If malicious, nothing persists.

Minimal Permissions in Workspace

Even within workspace:

AI Agent Safety

When AI agents suggest installing packages:

Scenario
Protection

AI suggests malicious package

Runs in workspace, not your device

AI runs curl | bash

Executes in workspace only

AI modifies system files

Workspace system, not yours

AI installs rootkit

Terminated with workspace

This is why ZYBER exists, so AI agents can experiment freely without risking your actual system.

Limitations

ZYBER protects your device, but cannot prevent:

Risk
Mitigation

Malicious code accessing workspace data

Use ephemeral sessions for sensitive work

Exfiltration of API keys stored in workspace

Rotate keys, use short-lived tokens

Cryptocurrency mining in workspace

Resource limits, billing visibility

Workspace being used for attacks

Network rate limiting, abuse detection

Last updated