Forem

# supplychain

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
MCPwn Is Live. We Scanned the Supply Chains of 14 MCP Servers. Here's What We Found.

MCPwn Is Live. We Scanned the Supply Chains of 14 MCP Servers. Here's What We Found.

Comments
5 min read
One Year of Liberation Day: What the Tariff Rollout Actually Revealed About AI Infrastructure

One Year of Liberation Day: What the Tariff Rollout Actually Revealed About AI Infrastructure

Comments
8 min read
161 verified AI package hallucinations across 8.5M indexed — open dataset

161 verified AI package hallucinations across 8.5M indexed — open dataset

Comments
4 min read
Two Independent Attack Surfaces: Why npm Provenance Doesn't Make a Package Safe

Two Independent Attack Surfaces: Why npm Provenance Doesn't Make a Package Safe

Comments
3 min read
Two Types of npm Supply Chain Attack: What Catches Each

Two Types of npm Supply Chain Attack: What Catches Each

Comments
5 min read
certifi has 350M weekly downloads and one publisher. It handles your SSL certificates.

certifi has 350M weekly downloads and one publisher. It handles your SSL certificates.

Comments
4 min read
Four MCP packages, four ways the supply chain shifted in two weeks of npm monitoring

Four MCP packages, four ways the supply chain shifted in two weeks of npm monitoring

Comments
7 min read
Slopsquatting in Python: What 205,474 Hallucinated Package Names Mean for Your Supply Chain

Slopsquatting in Python: What 205,474 Hallucinated Package Names Mean for Your Supply Chain

Comments
8 min read
Hacking GitHub: From Tag Rewrites to Dangling Commits, Where the Git Protocol Trusts You Without Checking
Cover image for Hacking GitHub: From Tag Rewrites to Dangling Commits, Where the Git Protocol Trusts You Without Checking

Hacking GitHub: From Tag Rewrites to Dangling Commits, Where the Git Protocol Trusts You Without Checking

Comments
19 min read
I built chainscope: reading supply chain attacks across 6 surfaces, one slide at a time
Cover image for I built chainscope: reading supply chain attacks across 6 surfaces, one slide at a time

I built chainscope: reading supply chain attacks across 6 surfaces, one slide at a time

Comments
7 min read
SLSA Provenance Hands-on: Generate with GitHub Actions, Verify with slsa-verifier
Cover image for SLSA Provenance Hands-on: Generate with GitHub Actions, Verify with slsa-verifier

SLSA Provenance Hands-on: Generate with GitHub Actions, Verify with slsa-verifier

Comments
11 min read
Why Did Docker Abandon TUF?: A Turbulent History of Container Signing
Cover image for Why Did Docker Abandon TUF?: A Turbulent History of Container Signing

Why Did Docker Abandon TUF?: A Turbulent History of Container Signing

2
Comments
10 min read
The power adapter was the attack

The power adapter was the attack

Comments
7 min read
The Anthropic SDK Looks Safe. Two of Its Transitive Dependencies Are Not.

The Anthropic SDK Looks Safe. Two of Its Transitive Dependencies Are Not.

Comments
3 min read
A postcard breached a warship

A postcard breached a warship

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.