
Episode 74: Supply Chain Attack Primer - Popping RCE Without an HTTP Request (feat 0xLupin)
Critical Thinking - Bug Bounty Podcast
Significance of Lock Files and Supply Chain Security Vulnerabilities
This chapter delves into the importance of lock files in packages for maintaining all dependencies and emphasizes the role of scanning tools in effective tool building. It discusses supply chain issues, vulnerabilities, and the significance of checking artifacts in bug bounty programs. The conversation highlights security vulnerabilities in the supply chain, focusing on subdependency mapping, attacking artifactories and registries, and the impact of cache poisoning on disrupting client pipelines.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.