Overview
Syllabus
Intro
The real cost of a vulnerable supply chain
SolarWinds attack
Secure supply chain frameworks
Software signing
Vulnerability databases
Vulnerabilities and PyPI
PyPI and malicious packages
SBOMS and VEX
Python container images
Scanning for vulnerabilities in source code
Python community initiatives
PEP 458 & PEP 480
PEP 708: Extending the Repository API to Mitigate Dependency Confusion Attacks
PEP 710: Recording the provenance of installed packages
SLSA Supply-chain Levels for Software Artifacts
Graph for Understanding Artifact Composition
Taught by
DevConf