Archived link

The polyfill.js is a popular open source library to support older browsers. 100K+ sites embed it using the cdn.polyfill.io domain. Notable users are JSTOR, Intuit and World Economic Forum. However, in February this year, a Chinese company bought the domain and the Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds cdn.polyfill.io. Any complaints were quickly removed (archive here) from the Github repository.

  • Echo Dot
    link
    fedilink
    English
    arrow-up
    5
    ·
    6 months ago

    Yeah I used to be guilty of this. Although in slight defense of myself I never used to use random sites like that I always used to pull everything from Google CDN since I can’t see that changing hands.

    They may very well shut it down without warning, but they’re probably not going to sell it to anyone.

    • dan@upvote.au
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      6 months ago

      Yeah, it really depends on how much you trust the vendor.

      Google? Say what you want about the company, but they’ll never intentionally serve malware.

      Random company with no track record where we don’t even know who is maintaining the code? Much less trustworthy. The polyfill . io repo is currently owned by a Github user called “polyfillpolyfill” with no identifying information.

      Third-party CDNs make less sense these days though. A lot of hosting services have a CDN of some sort. Most sites have some sort of build process, and you usually bundle all your JS and CSS (both your code and third-party code, often as separate bundles) as part of that.