02-sops

supply chain security

·sop ·status: active

Supply Chain Security SOP

Context

Supply chain attacks on package registries (npm, PyPI) are increasing, particularly targeting AI/ML tooling. axios 1.14.1 and litellm 1.82.8 were both compromised within the same week (March 2026). This SOP defines how we manage package dependencies safely.

Package Managers (Standardized)

LanguagePackage ManagerLockfile
Pythonuv (not pip/pip3)uv.lock
JavaScriptnpm (with lockfile)package-lock.json
Bun projectsbunbun.lock
System toolsHomebrewBrewfile.lock.json

Rules

Never Do

Always Do

Before Updating Any Package

  1. Check the package’s latest release date — if < 7 days old, wait
  2. Check Socket.dev or GitHub Advisory Database for known issues
  3. Review the changelog — does the update make sense? Unexpected new dependencies are a red flag
  4. Update in isolation, test, then commit the lockfile

Homebrew

brew pin tmux
brew pin node

Monitoring

Incident Response

If a compromised package is found on the machine:

  1. Check exact installed version — is it the affected version?
  2. Check for the malicious payload (e.g., specific files, suspicious dependencies)
  3. If compromised: uninstall immediately, audit for artifacts in temp directories
  4. Notify founder
  5. Document in vault under 06-reference/security-incidents/