Overview
Syllabus
Intro
Stack Exchange
Software Deployment
Trust
Dependencies
Repository Provider
Cloud Provider
Its All Software
Colonel Bashing
Other options
Attackers viewpoint
Rule 34 of security
Short Con
Get The Code
Root Shell
Choosing A Target
Push A New Version
Access Control
Lack of curation
Lack of digital signing
Linux repositories
Darker files
Profit Chels
Metasploit
Audit The Code
Metasploit Packages
Trusted Repository
Better Repository Security
Update Framework
Long Con
Open Source Libraries
Start Your Own Package Repository
If I Was A Bad Guy
Fixing This
Problem
Module Count
Python
Conclusion
Questions
Taught by
OWASP Foundation