Completed
UNAUTHORIZED CHANGES
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Why You Should Care About Open Source Supply Chain Security
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 OPEN SOURCE SUPPLY CHAIN SECURITY (AND WHY YOU SHOULD CARE)
- 3 OVERVIEW
- 4 AFFECTING OPEN SOURCE ECOSYSTEMS
- 5 UNAUTHORIZED CHANGES
- 6 COMPROMISED SOURCE REPO
- 7 BUILD FROM MODIFIED SOURCE
- 8 COMPROMISED BUILD PROCESS
- 9 USE COMPROMISED DEPENDENCY
- 10 UPLOAD MODIFIED PACKAGE
- 11 COMPROMISE PACKAGE REPO
- 12 USE COMPROMISED PACKAGE
- 13 WHAT QUESTIONS MIGHT WE WANT TO ANSWER?
- 14 TERMINOLOGY
- 15 SIGSTORE
- 16 SLSA EXPLAINED
- 17 SLSA 1.0
- 18 EVALUATING RISKS
- 19 TRANSITIVE DEPENDENCIES
- 20 WHAT'S THE LATEST AND GREATEST?
- 21 SUPPORT OPEN SOURCE