The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment
By: Eduard Marin , Jinwoo Kim , Alessio Pavoni and more
Potential Business Impact:
Finds hidden dangers in code-sharing websites.
Serverless computing has rapidly emerged as a prominent cloud paradigm, enabling developers to focus solely on application logic without the burden of managing servers or underlying infrastructure. Public serverless repositories have become key to accelerating the development of serverless applications. However, their growing popularity makes them attractive targets for adversaries. Despite this, the security posture of these repositories remains largely unexplored, exposing developers and organizations to potential risks. In this paper, we present the first comprehensive analysis of the security landscape of serverless components hosted in public repositories. We analyse 2,758 serverless components from five widely used public repositories popular among developers and enterprises, and 125,936 Infrastructure as Code (IaC) templates across three widely used IaC frameworks. Our analysis reveals systemic vulnerabilities including outdated software packages, misuse of sensitive parameters, exploitable deployment configurations, susceptibility to typo-squatting attacks and opportunities to embed malicious behaviour within compressed serverless components. Finally, we provide practical recommendations to mitigate these threats.
Similar Papers
Bit of a Close Talker: A Practical Guide to Serverless Cloud Co-Location Attacks
Cryptography and Security
Finds ways hackers can spy on cloud programs.
An Empirical Study of Vulnerable Package Dependencies in LLM Repositories
Cryptography and Security
Fixes security holes in AI's building blocks.
Security Vulnerabilities in AI-Generated Code: A Large-Scale Analysis of Public GitHub Repositories
Cryptography and Security
Finds hidden mistakes in computer code made by AI.