logo FEDIDEVS

PyCon US 2026 2026

Day 2 (64) phildini (49)

I have made it to my first talk at

First up: Python Security with @sethmlarson and @miketheman

13 5 1

At current pace, there will be 65 CVEs that affect the package ecosystem this year.

This is easily 3x-4x previous years.

One response to this is PEP-811: defining a Python security response team, membership and responsibilities (peps.python.org/pep-0811/)

This makes it easier to add more members and spread the load.

One result already in place: a formal vulnerability report response framework, uniting Github security policies and docs and the security response team.

7 2 1

"AI is changing everything"

Tools are getting much better at finding bugs and defects, so finding these vulns is cheaper, both time and resources.

Reminder: Attackers just have to be correct once, defenders have to be right all the time.

AI has made this asymmetry worse!

5 4 1

Hello ! Do you want to come Ponder the Orbs?

The Orb Pondering open space, covering , , and beyond, is going to be in room 102C (that's the floor with registration in the main building) at 4pm tomorrow (Friday).

Come learn about making order from randomness, with paper and !

4 4 1

Starting with "Watering Hole Attacks" -- targeting places people are likely to return to.

Shai-Hulud, LiteLLM, Trivy are all examples.

A common loop is:

"Malicious release" -> "Cryptocoins/ransomware/credentials" -> "Get more accounts" -> repeat

Attacks in one ecosystem can spread, because so many companies ship multi-ecosystem packages.

2 0 1

How else are Watering Hole Attacks being mitigated?

- Trusted Reporters / Auto-Quarantine
- More Trusted Publishing providers
- sudo mode and more scoped privileges
- "Staged Releases"
- "Secure Distributions" for CPython

More Trusted Publishing Providers is desired! Warehouse is open source and PRs are welcome.

2 0 1

So what can package maintainers do to help?

Know who to call: [email protected] and [email protected]

Look into Zizmor, then CodeQL, Semgrep, Fuzzer, LLM

2 1 1

Malware reports are going up and to the right -- in fact we're at 4x year over year (🙃)

The people involved (Mike and Seth) have not 4x'd in response.

So let's talk about some of the attacks we're seeing.

1 0 1

40-50% of installs are not locked/pinned!

People are running on latest and not paying attention.

One new mitigation to some of these watering hole attacks: "Quarantine mode" and Trusted Reporters.

1 0 1

PyPI has also done a second audit! Funded by the Sovereign Tech Agency, and performed by @trailofbits

This was focused on the PyPI software itself, and was completed in 2023.

1 1 1