meta_pixel
Tapesearch Logo
Log in
Talk Python To Me

#168: 10 Python security holes and how to plug them

Talk Python To Me

Michael Kennedy

Technology

4.8635 Ratings

🗓️ 6 July 2018

⏱️ 60 minutes

🧾️ Download transcript

Summary

Do you write Python software that uses the network, opens files, or accepts user input? Of course you do! That's what almost all software does. But these actions can let bad actors exploit mistakes and oversights we've made to compromise our systems.

Transcript

Click on a timestamp to play from that location

0:00.0

Do you write Python software that uses a network, opens files, or even accepts user input?

0:04.8

Of course you do.

0:05.7

That's what almost all software does.

0:07.9

But these actions can let bad actors exploit mistakes and oversight.

0:11.9

We've made in our code that will allow them to compromise our systems.

0:15.3

Python is safer than some languages.

0:17.9

But there are plenty of issues to be careful of.

0:20.2

That's why Anthony Shaw and Anthony Langingsworth are here to discuss Python security.

0:25.2

This is Talk Python to Me, episode 168, recorded June 28, 2018.

0:30.1

Thank you. Welcome to Talk Python to me, a weekly podcast on Python, the language, the libraries, the ecosystem, and the personalities.

0:51.1

This is your host, Michael Kennedy. Follow me on Twitter where I'm at M. Kennedy. Keep up with

0:55.2

the show and listen to past episodes at talk python.fm and follow the show on Twitter via

1:00.0

at Talk Python. Anthony Shaw, Anthony Langhorst, welcome to Talk Python. Hey, Michael, it's great to be

1:06.3

back. Hey, Michael, I'm good to be my first time. Yeah, it's good to have you here. So we have a bit of a

1:11.7

name conflict here. So Anthony Shaw's aunt and Anthony Langsworth is Anthony for the rest of the show.

1:19.0

Hopefully that works for you all out there listening. And we're going to cover something that I think

1:23.5

is often overlooked in Python, the whole security side of things, right? I mean,

1:28.4

feel like, well, there's no buffer overflow issues and, you know, things like that. So we must be

1:32.9

just totally fine, right? No. If only that was the case. If only that was the case.

1:38.8

Exactly. There's actually a ton of interesting vulnerabilities and things that are pretty common, I suspect,

1:45.4

still in some circumstances that we're going to go through. But before we do, I'd like to

1:50.1

hear your guys story really quick. Anthony, how do you get into programming and Python?

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Michael Kennedy, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Michael Kennedy and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.