10 Python security holes and how to plug them
Episode #168,
published Fri, Jul 6, 2018, recorded Thu, Jun 28, 2018
Do you write Python software that uses the network, opens files, or accepts user input? Of course you do! That's what almost all software does. But these actions can let bad actors exploit mistakes and oversights we've made to compromise our systems.
Python is safer than some languages, but there are plenty of issues to be careful about. That's why Anthony Shaw and Anthony Langsworth are joining me to discuss Python security.
Links from the show
Python is safer than some languages, but there are plenty of issues to be careful about. That's why Anthony Shaw and Anthony Langsworth are joining me to discuss Python security.
Links from the show
Anthony Shaw on twitter: @anthonypjshaw
Anthony Langsworth on twitter: @alangsworth
10 common security gotchas in Python and how to avoid them: hackernoon.com
OWASP Top 10: owasp.org
PyGoat: owasp.org
DjanGoat: github.com
Risky Business Podcast: risky.biz
Sponsorship links
Test and code podcast: testandcode.com
Talk Python Training: training.talkpython.fm
Episode transcripts: talkpython.fm
--- Stay in touch with us ---
Subscribe to us on YouTube: youtube.com
Follow Talk Python on Mastodon: talkpython
Follow Michael on Mastodon: mkennedy
Anthony Langsworth on twitter: @alangsworth
10 common security gotchas in Python and how to avoid them: hackernoon.com
OWASP Top 10: owasp.org
PyGoat: owasp.org
DjanGoat: github.com
Risky Business Podcast: risky.biz
Sponsorship links
Test and code podcast: testandcode.com
Talk Python Training: training.talkpython.fm
Episode transcripts: talkpython.fm
--- Stay in touch with us ---
Subscribe to us on YouTube: youtube.com
Follow Talk Python on Mastodon: talkpython
Follow Michael on Mastodon: mkennedy