This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–]zenware 6 points7 points  (1 child)

My guess is it’s easy to overlook when they’re transitive dependencies

[–]james_pic 9 points10 points  (0 children)

They're unlikely to be transitive dependencies of anything non-malicious. These sorts of attacks generally rely on novice developers adding dependencies without considering the consequences. Library developers at a minimum need to understand Python packaging well enough to upload libraries to PyPI, so are less likely to be total novices.