Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
supplychain
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
161 verified AI package hallucinations across 8.5M indexed — open dataset
Vincenzo Rubino
Vincenzo Rubino
Vincenzo Rubino
Follow
May 4
161 verified AI package hallucinations across 8.5M indexed — open dataset
#
ai
#
security
#
supplychain
#
mcp
Comments
Add Comment
4 min read
Four MCP packages, four ways the supply chain shifted in two weeks of npm monitoring
Michael Kayode Onyekwere
Michael Kayode Onyekwere
Michael Kayode Onyekwere
Follow
May 1
Four MCP packages, four ways the supply chain shifted in two weeks of npm monitoring
#
security
#
supplychain
#
mcp
#
npm
Comments
Add Comment
7 min read
Slopsquatting in Python: What 205,474 Hallucinated Package Names Mean for Your Supply Chain
Sour durian
Sour durian
Sour durian
Follow
Apr 30
Slopsquatting in Python: What 205,474 Hallucinated Package Names Mean for Your Supply Chain
#
python
#
security
#
ai
#
supplychain
Comments
Add Comment
8 min read
I built chainscope: reading supply chain attacks across 6 surfaces, one slide at a time
kt
kt
kt
Follow
Apr 29
I built chainscope: reading supply chain attacks across 6 surfaces, one slide at a time
#
showdev
#
security
#
supplychain
Comments
Add Comment
7 min read
SLSA Provenance Hands-on: Generate with GitHub Actions, Verify with slsa-verifier
kt
kt
kt
Follow
Apr 29
SLSA Provenance Hands-on: Generate with GitHub Actions, Verify with slsa-verifier
#
security
#
supplychain
#
slsa
#
sigstore
Comments
Add Comment
11 min read
Why Did Docker Abandon TUF?: A Turbulent History of Container Signing
kt
kt
kt
Follow
Apr 28
Why Did Docker Abandon TUF?: A Turbulent History of Container Signing
#
security
#
docker
#
supplychain
#
sigstore
2
 reactions
Comments
Add Comment
10 min read
The Anthropic SDK Looks Safe. Two of Its Transitive Dependencies Are Not.
Pico
Pico
Pico
Follow
Apr 26
The Anthropic SDK Looks Safe. Two of Its Transitive Dependencies Are Not.
#
security
#
npm
#
javascript
#
supplychain
Comments
Add Comment
3 min read
Two Types of npm Supply Chain Attack: What Catches Each
Pico
Pico
Pico
Follow
Apr 26
Two Types of npm Supply Chain Attack: What Catches Each
#
npm
#
security
#
supplychain
#
javascript
Comments
Add Comment
5 min read
The Dependency Avalanche: 644 Strangers in Your package.json
Vivian Voss
Vivian Voss
Vivian Voss
Follow
Apr 25
The Dependency Avalanche: 644 Strangers in Your package.json
#
supplychain
#
opensource
#
freebsd
#
security
Comments
Add Comment
6 min read
572K Weekly Downloads, One Preinstall Script: The SAP CAP Supply Chain Attack Your AI Agent Would Have Missed
Toni Antunovic
Toni Antunovic
Toni Antunovic
Follow
Apr 29
572K Weekly Downloads, One Preinstall Script: The SAP CAP Supply Chain Attack Your AI Agent Would Have Missed
#
security
#
npm
#
supplychain
#
devops
1
 reaction
Comments
Add Comment
3 min read
Continuous monitoring caught a credential leak in a published MCP package. Six republishes later, it is still there.
Michael Kayode Onyekwere
Michael Kayode Onyekwere
Michael Kayode Onyekwere
Follow
Apr 25
Continuous monitoring caught a credential leak in a published MCP package. Six republishes later, it is still there.
#
security
#
supplychain
#
mcp
#
npm
Comments
Add Comment
7 min read
Supply Chain Attacks Targeting Bitwarden CLI and How to Defend
logiQode
logiQode
logiQode
Follow
Apr 24
Supply Chain Attacks Targeting Bitwarden CLI and How to Defend
#
security
#
npm
#
supplychain
#
devops
Comments
Add Comment
5 min read
Vercel OAuth Compromise via Context.ai: Timeline, IOCs, and Remediation
CyberXYZ Security
CyberXYZ Security
CyberXYZ Security
Follow
Apr 22
Vercel OAuth Compromise via Context.ai: Timeline, IOCs, and Remediation
#
security
#
supplychain
#
vercel
#
devops
Comments
Add Comment
4 min read
The EU Is Forcing User-Replaceable Phone Batteries. There's a Loophole Apple Is Already Using.
Alan West
Alan West
Alan West
Follow
Apr 22
The EU Is Forcing User-Replaceable Phone Batteries. There's a Loophole Apple Is Already Using.
#
righttorepair
#
euregulation
#
mobilehardware
#
supplychain
1
 reaction
Comments
Add Comment
4 min read
Slopsquatting: The AI Supply Chain Attack Vector You Are Not Monitoring
Daniel Glover
Daniel Glover
Daniel Glover
Follow
Apr 16
Slopsquatting: The AI Supply Chain Attack Vector You Are Not Monitoring
#
security
#
ai
#
supplychain
Comments
Add Comment
6 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account