Completed
Lockfile example
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Picking Lockfiles - Attacking & Defending Your Supply Chain
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 A Quick Story
- 3 Why are we talking about supply chains?
- 4 Attacking Supply Chains with Lockfiles
- 5 Defending Supply Chains
- 6 Lockfile example
- 7 Lockfile Tampering - Example
- 8 Multiple Attributes Occurrences
- 9 Integrity Hash Not Mandatory
- 10 Attacker Perspective: Compromising Supply Chains using Lockfiles
- 11 Attacker Techniques and Objectives
- 12 Bump-Key Tooling
- 13 Example: GitLab Merge Request
- 14 Example: Automated Dependency Update
- 15 Closing Words