Главная
Study mode:
on
1
Intro
2
Open-source software is eating the world
3
Package managers
4
Bad actors exploit this trust
5
Software supply chain attack
6
Attack Technique: Typosquatting
7
Case study: mitmpraxy2
8
Technique: Social Engineering
9
Technique: Dependency Confusion
10
Technique: Account Hijacking
11
How to defend against these attacks
12
Manual vetting is infeasible
13
Existing tools report KNOWN CVES
14
Vanity stats are not enough
15
Packj: a dev-friendly vetting tool
16
API Analysis
17
Metadata Analysis
18
Enabling package vetting at scale
Description:
Explore the critical issue of software supply chain security in this PyCon US talk. Delve into the world of bad actors exploiting package managers like PyPI to distribute malware. Learn about various attack techniques including typosquatting, social engineering, dependency confusion, and account hijacking. Discover a large-scale vetting system that analyzes millions of software package versions for malicious content and risky attributes. Gain insights into the development of this system and examine real-world malware detection case studies. Get introduced to OSSIE, a free Python PyPI package for auditing project dependencies and receiving notifications about malicious dependencies. Understand the importance of usable security tools in defending against software supply chain attacks and explore how Packj, a developer-friendly vetting tool, can help protect your projects through API and metadata analysis.

Bad Actors vs Our Community - Detecting Software Supply Chain Attacks

PyCon US
Add to list