🚨AlterKS Quarantine Feature Not every suspicious package is malicious. Sometimes you need to investigate. AlterKS has a quarantine feature. It isolates risky packages into a separate virtual environment instead of blocking them outright. alterks quarantine list alterks quarantine inspect <package> <version> alterks quarantine release <package> <version> Your main environment stays clean. Your security team gets time to review. No guesswork. As of v0.3.2, quarantine creates real isolated venvs with full manifest tracking. PyPI: https://lnkd.in/dbw_XEiv GitHub: https://lnkd.in/dT-haNSG Blog post: https://lnkd.in/dx4WzySg #Python #ApplicationSecurity #DeveloperExperience
AlterKS Quarantine Feature for Suspicious Packages
More Relevant Posts
-
Version 1 of my network documentation tool is done! You point it at your network, it collects show commands, redacts anything sensitive, builds a prompt for any LLM, and gives you back a finished runbook with your real IPs and hostnames. Five Python scripts. Everything runs locally except the LLM prompt. The redactor strips credentials, IPs, hostnames, serial numbers, MACs. 11 categories total. Credentials are always removed. Everything else is your call based on your security policy. I also threw in a bonus script that generates a network diagram from the output. No AI needed for that one. The whole thing is free on my GitHub. Scripts, lab files, and a CML topology you can import and run right now. Full walkthrough video is in the comments. #NetworkEngineering #NetworkAutomation #Python #IT #CiscoNetworking
To view or add a comment, sign in
-
I discovered an unsafe deserialization vulnerability in PLY (Python Lex-Yacc), assigned CVE-2025-56005. The vulnerability was accepted by Ubuntu, SUSE, Red Hat and others. Someone filed a rejection disputing the finding, but the CVE stands and is listed on both NVD and MITRE. My take: it should not be rejected. pickle.load() on an unvalidated file is a well-known unsafe deserialization pattern. The threat is real in shared environments and CI/CD pipelines where grammar table files can be tampered with. The rejection argument missed the actual threat model. Not every research finding goes smoothly. Learning to defend your work with technical evidence is part of the job. Full write-up on GitHub: [https://lnkd.in/dMrM4hwJ] So what do you think — should it be rejected?
To view or add a comment, sign in
-
-
Logout in AuthShield was supposed to be straightforward. User clicks logout. Token gets invalidated. Done. Except a JWT cannot be invalidated. It is a signed string. There is nothing to delete. It just keeps working until it expires. That one realization pulled on everything else. If logout needs a blacklist, access tokens need to be short-lived so the blacklist stays small. If tokens are short-lived, users cannot stay logged in without constantly re-authenticating. That means two tokens - a short-lived access token for requests, a long-lived refresh token to silently replace it. But a long-lived refresh token is a theft target. So it rotates on every use. But rotation alone does not stop an attacker who uses the token before the real user does. Token families. Every refresh token belongs to a chain tied to a single login. The moment an already-rotated token is used again, the entire chain is revoked. Attacker and real user both get logged out. Four problems. Each one hiding behind the previous one. Full breakdown with the Python implementation in the blog. Link in the comments 👇 #BackendEngineering #Python #JWT #Security #Authentication #SoftwareEngineering
To view or add a comment, sign in
-
-
🚨 High Risk Alert! Gramps Web API, a Python REST API for genealogical research software, has a path traversal vulnerability (CVE-2026-40258) 🕸️. An authenticated user with owner-level privileges can craft a malicious ZIP file to write arbitrary files outside the intended directory on the server's local filesystem. This highlights the importance of API security 🔒. Stay safe! #GrampsWebAPI #Python #RESTAPI #OWASP #APIsecurity https://lnkd.in/gsjivDyy
To view or add a comment, sign in
-
Excited to launch ShadowTrace v1.0! 🌍🛡️ I built this advanced Real-Time Network Traffic Visualizer to bridge the gap between raw packet data and visual intelligence. Key Features: 🔹 Live Packet Sniffing (Python & Scapy). 🔹 OS Fingerprinting (TTL & Window Size analysis). 🔹 Geo-Location Mapping (Leaflet.js). 🔹 Real-time Sync via WebSockets. Designed for efficiency and clear network insights. Check out the video below to see it in action! 🚀 Tech Stack: Python | Scapy | WebSockets | JavaScript 🔗 GitHub Repository: https://lnkd.in/dJr6yeiJ 👤 Follow my work: https://lnkd.in/ddCY92r6 #CyberSecurity #Networking #Python #DevOps #SecurityTools #OpenSource #Tech
To view or add a comment, sign in
-
🎉 InstapaperScraper v1.3.1 – Production Release We’re excited to announce that v1.3.1 is now officially live on PyPI and GitHub! This stable release focuses on strengthening security, improving compatibility, and enhancing developer experience. Key Highlights: 🔒 Security fix – Prevent path traversal in output filenames 🔒 API validation – Ensure folder_id and slug values are URL‑safe ⚙️ Compatibility update – Dropped Python 3.9 (EOL) support Install via PyPI today! 👉 pip install instapaper-scraper==1.3.1 #InstapaperScraper #Python #OpenSource #ProductivityTools #LinkedInTech
To view or add a comment, sign in
-
This one was the easy room which taught me how an ftp server exposed to webpage and accessible can be exploited with putting web-shell and then we get reverse shell then Local Priv Esc without having gcc but you integrate AI to change that code to python and when we ran it we got the root shell. Thanks TryHackMe. . . . . Find my writeup on :: https://lnkd.in/gxvKqKPv
To view or add a comment, sign in
-
-
gdown v6 is out. Biggest changes this time: - Folder downloads work with more than 50 files (this was annoying for everyone for a long time) - download() raises DownloadError on failure (instead of returning None) - New progress callback - All deprecated v5 APIs finally removed - Python 3.10+ 33 pull requests, 109 commits since v5.2.1. https://lnkd.in/gRAegKhj
To view or add a comment, sign in
-
-
Version 1.0 Of DorkSINT is live!! DorkSINT is an open-source Python CLI that speeds up Google dorking by turning your search objective into structured, paste-ready queries. It supports interactive prompts and non-interactive flags, includes reusable query templates, and runs natively in both PowerShell and CMD. Built for legal, authorized security research ONLY. https://lnkd.in/gYg2yhGA
To view or add a comment, sign in
-
-
Critical vulnerability CVE-2026-5752 in Terrarium sandbox risks root access. Terrarium, a Python sandbox in Docker containers, suffers JavaScript prototype traversal flaw. Exploitation allows sandbox escape and root code execution on host. This affects any organization running untrusted code in containers. Attackers can access sensitive files and pivot across container networks. Mitigate by disabling code submissions, segmenting networks, deploying WAFs, monitoring containers, restricting access, managing containers securely, and updating dependencies.
To view or add a comment, sign in
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development