Learn Python with Talk Python's Python courses

10 Python security holes and how to plug them

Episode #168, published Fri, Jul 6, 2018, recorded Thu, Jun 28, 2018.

This episode is carbon neutral.
Do you write Python software that uses the network, opens files, or accepts user input? Of course you do! That's what almost all software does. But these actions can let bad actors exploit mistakes and oversights we've made to compromise our systems.

Python is safer than some languages, but there are plenty of issues to be careful about. That's why Anthony Shaw and Anthony Langsworth are joining me to discuss Python security.

Links from the show

Anthony Shaw on twitter: @anthonypjshaw
Anthony Langsworth on twitter: @alangsworth

10 common security gotchas in Python and how to avoid them: hackernoon.com

OWASP Top 10: owasp.org
PyGoat: owasp.org
DjanGoat: github.com
Risky Business Podcast: risky.biz

Sponsorship links
Test and code podcast: testandcode.com
Talk Python Training: training.talkpython.fm
Episode transcripts: talkpython.fm

Want to go deeper? Check out our courses

Episode sponsored by
Ads served ethically
Click to show comments

Individuals can support this podcast directly via Patreon. Corporate sponsorship opportunities available here.
Become a friend of the show
Stay in the know and get a chance to win our contests.
See our privacy statement about email communications.