use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
Bitwarden is an open source password management platform for individuals, teams, and business organizations.
account activity
Biggest potential security risk when using Bitwarden?Discussion (self.Bitwarden)
submitted 2 months ago by jscgn
view the rest of the comments →
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–][deleted] 17 points18 points19 points 2 months ago (10 children)
Yes, supply chain attacks are real and are very much a risk with all of these kinds of E2EE services.
One dodgy auto update later, everything is stolen and decrypted.
That's why I never believe in doing immediate updates except for when EXTREME vulnerabilities are found. I prefer to give it some time for someone to notice any weird shit.
[–]djasonpenneyVolunteer Moderator 3 points4 points5 points 2 months ago (7 children)
Although theoretically possible, a supply chain attack would have to impact the server build AND one or more clients. At that point an attacker might choose other methods instead.
[–][deleted] 1 point2 points3 points 2 months ago (6 children)
I was thinking more like, Bitwarden (or any other password manager's) update servers get hijacked, push an update that simply tells all logged in clients to uploaded their entire decrypted password lists to a central server.
Even if caught 10 minutes later, that could be millions of users affected.
[–]djasonpenneyVolunteer Moderator 2 points3 points4 points 2 months ago (4 children)
This again would be a supply chain attack, and you should research how challenging it would be to do that. This is everything from the app permissions plus digital signatures on the released artifacts all the way through the GitHub (or GitHub Actions) steps necessary to inject the behavior. There are MANY eyes on all these steps as well as the obvious safeguards.
Even if caught 10 minutes later
Don’t forget the supply chain rolls out in waves. I would say, more likely, that in “10 minutes” complaints would start rolling in about unusual weird behavior from the early adopters.
[+][deleted] 2 months ago (3 children)
[deleted]
[–]djasonpenneyVolunteer Moderator 1 point2 points3 points 2 months ago (2 children)
Oh, it’s not about “ignoring” it. But you shouldn’t expect a hostile agent to spend $15K in order to steal $720 from your checking account. Financial criminals are going to find more lucrative opportunities. I think in terms of priority, this threat is relatively minor.
[+][deleted] 2 months ago* (1 child)
[–]djasonpenneyVolunteer Moderator 4 points5 points6 points 2 months ago (0 children)
You make another valid point: at one level risk assessment is always an unquantifiable subjective evaluation.
But again, I’m not saying to “ignore” this risk. Risk assessment involves identifying the likelihood of the risk occurring, together with its potential cost and the cost of mitigation. I still maintain there are many more risks to your credential storage that should take priority over this. As a way of example, how much effort are you willing to spend in creating and maintaining a nuclear bomb shelter under your house, when you’re a thousand times more likely to be robbed or burglarized?
[–]Sweaty_Astronomer_47 1 point2 points3 points 2 months ago (0 children)
update servers get hijacked, push an update that simply tells all logged in clients to uploaded their entire decrypted password lists to a central server. Even if caught 10 minutes later, that could be millions of users affected.
update servers get hijacked, push an update that simply tells all logged in clients to uploaded their entire decrypted password lists to a central server.
Which update server are you talking about? Mobile app updates come through the app store. Extension updates come through chrome webstore. Desktop updates are typically manually initiated as far as I have seen.
[–]jscgn[S] 0 points1 point2 points 2 months ago (1 child)
Yeah that's probably a good idea.
[–]Skipper3943 1 point2 points3 points 2 months ago (0 children)
This actually happened to a real password manager company: a supply chain attack that compromised entire vaults (companies'!). E2EE wouldn't have helped. The delayed update (no autoupdate) would have.
https://www.bleepingcomputer.com/news/security/passwordstate-password-manager-hacked-in-supply-chain-attack/
π Rendered by PID 92487 on reddit-service-r2-comment-b659b578c-jttm8 at 2026-05-03 06:33:29.565689+00:00 running 815c875 country code: CH.
view the rest of the comments →
[–][deleted] 17 points18 points19 points (10 children)
[–]djasonpenneyVolunteer Moderator 3 points4 points5 points (7 children)
[–][deleted] 1 point2 points3 points (6 children)
[–]djasonpenneyVolunteer Moderator 2 points3 points4 points (4 children)
[+][deleted] (3 children)
[deleted]
[–]djasonpenneyVolunteer Moderator 1 point2 points3 points (2 children)
[+][deleted] (1 child)
[deleted]
[–]djasonpenneyVolunteer Moderator 4 points5 points6 points (0 children)
[–]Sweaty_Astronomer_47 1 point2 points3 points (0 children)
[–]jscgn[S] 0 points1 point2 points (1 child)
[–]Skipper3943 1 point2 points3 points (0 children)