Tag: dependency management
-
The Register: More packages poisoned in npm attack, but would-be crypto thieves left pocket change
Source URL: https://www.theregister.com/2025/09/09/npm_supply_chain_attack/ Source: The Register Title: More packages poisoned in npm attack, but would-be crypto thieves left pocket change Feedly Summary: Miscreants cost victims time rather than money During the two-hour window on Monday in which hijacked npm versions were available for download, malware-laced packages reached one in 10 cloud environments, according to Wiz…
-
Docker: Building AI Agents with Docker MCP Toolkit: A Developer’s Real-World Setup
Source URL: https://www.docker.com/blog/docker-mcp-ai-agent-developer-setup/ Source: Docker Title: Building AI Agents with Docker MCP Toolkit: A Developer’s Real-World Setup Feedly Summary: Building AI agents in the real world often involves more than just making model calls — it requires integrating with external tools, handling complex workflows, and ensuring the solution can scale in production. In this post,…
-
The Register: Not pretty, not Windows-only: npm phishing attack laces popular packages with malware
Source URL: https://www.theregister.com/2025/07/24/not_pretty_not_windowsonly_npm/ Source: The Register Title: Not pretty, not Windows-only: npm phishing attack laces popular packages with malware Feedly Summary: The “is" package was infected with cross-platform malware after a scam targeting maintainers The popular npm package "is" was infected with cross-platform malware, around the same time that linting utility packages used with the…
-
Docker: 5 Best Practices for Building, Testing, and Packaging MCP Servers
Source URL: https://www.docker.com/blog/mcp-server-best-practices/ Source: Docker Title: 5 Best Practices for Building, Testing, and Packaging MCP Servers Feedly Summary: We recently launched a new, reimagined Docker MCP Catalog with improved discovery and a new submission process. Containerized MCP servers offer a secure way to run and scale agentic applications and minimize risks tied to host access…