GeistHaus
log in · sign up

Defense in Depth: A Practical Guide to Python Supply Chain Security

bernat.tech

A comprehensive guide to securing your Python dependencies from ingestion to deployment, covering linting, pinning, vulnerability scanning, SBOMs, and attestations

6 pages link to this URL
Why Use Trusted Publishing for PyPI?

Trusted publishing replaces long-lived PyPI API tokens with short-lived OIDC credentials, eliminating the most common way attackers gain unauthorized upload access to PyPI.

0 inbound links article en handbook
LLM-Powered Copycats Are Flooding PyPI

A developer published his first PyPI package. Within hours, three AI-generated clones appeared. The pattern is spreading, and it's a supply chain risk.

0 inbound links article en blog
LLBBL Blog

Follow <a href="https://micro.blog/llbbl">@llbbl on Micro.blog</a>.

0 inbound links website en
Scroll trīgintā quattuor

Arcane curation from the IndieWeb, Fediverse and Cybersecurity realms

1 inbound link article en Scroll trīgintā quattuorshellsharksinfosecindiewebfediverse
Python and Rust Have the Same Supply Chain Problem as NPM

Last post I walked through the threat model for supply chain attacks and dug into the NPM ecosystem specifically: postinstall scripts, npm ci, pnpm’s release-age cooldown. The same structural problems exist in Python and Rust, but the failure modes are different and the tooling has evolved in some surprising directions. Worth understanding both, because if you write any backend code in 2026 you’re probably touching at least one of these ecosystems.

0 inbound links article en 2026