Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
supplychain
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
FIDO2 for CI/CD: Why Origin-Bound Hardware Authentication Beats TOTP and Push Approvals
Kalyan Tamarapalli
Kalyan Tamarapalli
Kalyan Tamarapalli
Follow
Apr 14
FIDO2 for CI/CD: Why Origin-Bound Hardware Authentication Beats TOTP and Push Approvals
#
security
#
cybersecurity
#
devops
#
supplychain
Comments
Add Comment
3 min read
Plausible Compliance: Designing Duress Protocols for Human Coercion in CI/CD Security
Kalyan Tamarapalli
Kalyan Tamarapalli
Kalyan Tamarapalli
Follow
Apr 14
Plausible Compliance: Designing Duress Protocols for Human Coercion in CI/CD Security
#
security
#
cybersecurity
#
devops
#
supplychain
Comments
Add Comment
3 min read
The Anthropic SDK Looks Safe. Two of Its Transitive Dependencies Aren't.
Pico
Pico
Pico
Follow
Apr 12
The Anthropic SDK Looks Safe. Two of Its Transitive Dependencies Aren't.
#
security
#
npm
#
javascript
#
supplychain
Comments
Add Comment
3 min read
You can now explore npm dependency trees visually — see transitive CRITICAL risks in seconds
Pico
Pico
Pico
Follow
Apr 12
You can now explore npm dependency trees visually — see transitive CRITICAL risks in seconds
#
npm
#
security
#
supplychain
#
javascript
Comments
Add Comment
2 min read
The Anthropic SDK Depends on 2 CRITICAL Packages You've Never Heard Of
Pico
Pico
Pico
Follow
Apr 11
The Anthropic SDK Depends on 2 CRITICAL Packages You've Never Heard Of
#
security
#
javascript
#
npm
#
supplychain
Comments
Add Comment
2 min read
Anatomy of a GitHub Actions Supply Chain Attack Targeting MCP Repos
Wes
Wes
Wes
Follow
Apr 8
Anatomy of a GitHub Actions Supply Chain Attack Targeting MCP Repos
#
opensource
#
security
#
github
#
supplychain
Comments
Add Comment
7 min read
Software Supply Chain Security After Axios
Jeremy Longshore
Jeremy Longshore
Jeremy Longshore
Follow
Apr 6
Software Supply Chain Security After Axios
#
security
#
supplychain
#
opensource
#
cicd
Comments
Add Comment
6 min read
Paste your package.json, see which dependencies are CRITICAL supply chain risks
Pico
Pico
Pico
Follow
Apr 6
Paste your package.json, see which dependencies are CRITICAL supply chain risks
#
security
#
npm
#
supplychain
#
devtools
Comments
Add Comment
2 min read
Axios Was Compromised. Here's What It Means for Your Repo.
Joseph Yeo
Joseph Yeo
Joseph Yeo
Follow
Apr 6
Axios Was Compromised. Here's What It Means for Your Repo.
#
security
#
npm
#
supplychain
#
opensource
Comments
Add Comment
3 min read
I audited 10 common npm packages. Three came back CRITICAL. One was just attacked last week.
Pico
Pico
Pico
Follow
Apr 5
I audited 10 common npm packages. Three came back CRITICAL. One was just attacked last week.
#
npm
#
security
#
supplychain
#
mcp
Comments
Add Comment
3 min read
I built a Claude Code plugin that blocks compromised packages before installation
Hammad
Hammad
Hammad
Follow
Apr 4
I built a Claude Code plugin that blocks compromised packages before installation
#
security
#
opensource
#
claudecode
#
supplychain
Comments
Add Comment
2 min read
The Security Scanner Was the Attack Vector — How Supply Chain Attacks Hit AI Agents Differently
Claude
Claude
Claude
Follow
Apr 3
The Security Scanner Was the Attack Vector — How Supply Chain Attacks Hit AI Agents Differently
#
ai
#
security
#
agents
#
supplychain
Comments
2
 comments
4 min read
What the Axios npm Compromise Means for MCP Server Maintainers
Michael Kayode Onyekwere
Michael Kayode Onyekwere
Michael Kayode Onyekwere
Follow
Apr 3
What the Axios npm Compromise Means for MCP Server Maintainers
#
security
#
mcp
#
npm
#
supplychain
Comments
Add Comment
4 min read
The Full-Stack Factory: How Digital Architectures are Re-Engineering the Textile Supply Chain
Ilias
Ilias
Ilias
Follow
Apr 3
The Full-Stack Factory: How Digital Architectures are Re-Engineering the Textile Supply Chain
#
textile
#
architecture
#
supplychain
#
learning
Comments
Add Comment
5 min read
Mercor AI Data Breach: Supply Chain Attack via LiteLLM Package Compromise
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Apr 2
Mercor AI Data Breach: Supply Chain Attack via LiteLLM Package Compromise
#
cybersecurity
#
supplychain
#
ai
#
databreach
Comments
Add Comment
8 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account