Charles Coggins
Senior Software Engineer, responsible for integrations and author of the "phylum" Python package. Documentation and quality champion, runner, baseball and scout dad, pod-faster, and lover of outdoors.
Arbitrary code execution is possible and even common during package installation. Learn how attackers use this to their advantage.
Python Trojan Functions and Imports
Learn basic techniques attackers use to create malicious packages with trojan features found in attacks, including typosquatting, starjacking, dependency confusion, and lockfile injection.
Python Package Spoofing
Find out how easy it is for threat actors to spoof legitimate Python packages as the foundation of their attacks on the software supply chain.
Series: How Malicious Python Code Gains Execution
Beyond vulnerabilities: Secure your Python code. Learn how attackers target software supply chains and an approach to preventing malicious code execution. See Phylum Research.
The Power of the Pod
I love podcasts. I started listening in 2005 with an Apple iPod I got the year before. To really date me, I used a 3.5mm auxiliary-to-cassette adapter plugged into my truck's tape deck