Monitor performance issues & errors in your code

Software Supply Chain Security with Phylum

Episode #457, published Fri, Apr 19, 2024, recorded Wed, Jan 24, 2024

We've spoken previously about security and software supply chains and we are back at it this episode. We're diving in again with Charles Coggins. Charles works at a software supply chain company and is on to give us the insiders and defender's perspective on how to keep our Python apps and infrastructure safe.

Watch this episode on YouTube
Play on YouTube
Watch the live stream version

Links from the show

Series: How Malicious Python Code Gains Execution:

Pick a Python Lockfile and Improve Security:
Bad Beat Poetry:
PEP 665 – A file format to list Python dependencies for reproducibility of an application:
PEP 517 – A build-system independent format for source trees:
PEP 518 – Specifying Minimum Build System Requirements for Python Projects:
Lockfiles should be committed on all projects:
An Overview of Software Supply Chain Security:
Common Attack Pattern Enumeration and Classification:
Dependency Confusion:
Expired Author Domains:
Unverifiable Dependency:
Repo Jacking: Hidden Danger in Broken Links:
Software Libraries Are Terrifying:
phylum 0.43.0:
rich-codex ⚡️📖⚡️:
Phylum Community Discord:
The dream is dead?:
When "Everything" Becomes Too Much: The npm Package Chaos of 2024:
Watch this episode on YouTube:
Episode transcripts:

--- Stay in touch with us ---
Subscribe to us on YouTube:
Follow Talk Python on Mastodon: talkpython
Follow Michael on Mastodon: mkennedy

Want to go deeper? Check out our courses

Talk Python's Mastodon Michael Kennedy's Mastodon