Brought to you by Linode - Build your next big idea @ linode.com

Episode #168: 10 Python security holes and how to plug them

Published Fri, Jul 6, 2018, recorded Thurs, Jun 28, 2018.


Do you write Python software that uses the network, opens files, or accepts user input? Of course you do! That's what almost all software does. But these actions can let bad actors exploit mistakes and oversights we've made to compromise our systems.

Python is safer than some languages, but there are plenty of issues to be careful about. That's why Anthony Shaw and Anthony Langsworth are joining me to discuss Python security.

Links from the show

Anthony Shaw on twitter: @anthonypjshaw
Anthony Langsworth on twitter: @alangsworth

10 common security gotchas in Python and how to avoid them: hackernoon.com

OWASP Top 10: owasp.org
PyGoat: owasp.org
DjanGoat: github.com
Risky Business Podcast: risky.biz

Sponsorship links
Test and code podcast: testandcode.com
Talk Python Training: training.talkpython.fm

Panelists
Panelists
Click to show comments


Individuals can support this podcast directly via Patreon. Corporate sponsorship opportunities available here.
X
Become a friend of the show
Stay in the know and get a chance to win our contests.
See our privacy statement about email communications.