Check your installed composer packages against a list of known correct checksums (provided by Sansec).
This plugin calculates a one-way hash of:
- composer.json and composer.lock
- package name and package versions
- file contents of the installed packages (checksum)
These hashes are then tested against a larger database hosted at Sansec. The use of one-way hashing provides a secure way to test your setup, without sharing file contents with a third party. The Sansec API does not store your hashes.
composer require sansec/composer-integrity-plugin
You can then run it:
composer integrity
Head over to the releases page and download the latest PHAR.
You can then run it:
php composer-integrity.phar
Both the plugin as well as the PHAR take the following optional options:
--skip-match
: shows only non-matching checksums--json
: output is in json format instead of a table
Sansec specializes in forensic investigations of breached Magento stores. We noticed an increase of cases where malware was hidden in legitimate libraries under vendor
. Most package managers provide some sort of integrity check for installed software, but composer does not. So, we made this plugin in order to quickly verify the integrity of an installation.
Alternatively, you could clone the composer files, recreate vendor and run a diff against your installation. But this takes much more time and original dependencies are not always available on production servers.
The plugin does not consider patches, such as those applied through composer-patches, via a post-install-cmd
composer script, or editing in vendor
outright.
In such instances, it is the user's responsibility to assess the situation and take appropriate action.
MIT License - Copyright (c) 2023 Sansec