sethmlarson,
@sethmlarson@fosstodon.org avatar

An update on the release process, , and some thoughts on after talking about it with lots of folks.

https://sethmlarson.dev/security-developer-in-residence-weekly-report-33

djh,
@djh@chaos.social avatar

@sethmlarson My hunch was always that 3rd party dependencies (PyPI) were the weakest link in the Python ecosystem.

If I pip install something today, during that installation arbitrary code can run with 1) full access to the filesystem and 2) network access, no?

I always wondered why that's treated as OK and there's very little to nothing out there taking care e.g. of sandboxing?

I'm not up to date here, tho, anything moving in this regard?

sethmlarson,
@sethmlarson@fosstodon.org avatar

@djh Many packaging ecosystems have "build scripts" to access tools and libraries outside of the packaging ecosystem for legitimate reasons.

Sandboxing the build/install means malware authors will move the malicious code from the install stage to the library code itself for when you inevitably run the code you just installed

This is why removing build scripts/isolating them to just virtualenv doesn't seem like a great trade-off considering the utility build scripts offer.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • python
  • magazineikmin
  • rosin
  • mdbf
  • Youngstown
  • love
  • slotface
  • khanakhh
  • ngwrru68w68
  • kavyap
  • ethstaker
  • thenastyranch
  • DreamBathrooms
  • GTA5RPClips
  • cubers
  • provamag3
  • tacticalgear
  • osvaldo12
  • InstantRegret
  • Durango
  • normalnudes
  • everett
  • cisconetworking
  • Leos
  • modclub
  • anitta
  • tester
  • megavids
  • JUstTest
  • All magazines