<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-04-17T15:12:24Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by Python Package Index</title>
  <author>
    <name>Python Package Index</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub1g52zm7t45x9srp48swy44hc03k2qzkckd63vyqfl0jvnvkzz8n0ql68fy6.rss" />
  <link href="https://yabu.me/npub1g52zm7t45x9srp48swy44hc03k2qzkckd63vyqfl0jvnvkzz8n0ql68fy6" />
  <id>https://yabu.me/npub1g52zm7t45x9srp48swy44hc03k2qzkckd63vyqfl0jvnvkzz8n0ql68fy6</id>
  <icon>https://cdn.fosstodon.org/accounts/avatars/110/460/563/228/175/137/original/3ae1e745c2f1e485.jpg</icon>
  <logo>https://cdn.fosstodon.org/accounts/avatars/110/460/563/228/175/137/original/3ae1e745c2f1e485.jpg</logo>




  <entry>
    <id>https://yabu.me/nevent1qqsts79cur532sdx3v9xz7000s998cmgnfezunhy4hwg3rw7f7cdejqzypz3gt0ewksckqvx57pcjkklp7xegq2mzeh29ssp8a7fjdjcgg7du4ep5kq</id>
    
      <title type="html">🔎🔐 #PyPI has completed its second external #security audit! ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsts79cur532sdx3v9xz7000s998cmgnfezunhy4hwg3rw7f7cdejqzypz3gt0ewksckqvx57pcjkklp7xegq2mzeh29ssp8a7fjdjcgg7du4ep5kq" />
    <content type="html">
      🔎🔐 #PyPI has completed its second external #security audit! Thanks to &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1yng6dx32zrl2qhp2kq26al7uzkwqkugrkaxf4gsycs9r5snrkjdqlznhrk&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Sovereign Tech Agency&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1yng…nhrk&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; for funding, &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1rcsevfzqfj6xzk0rajfaftsnq4f4wewydfyxd9u46jch4sxta60qjz7sw8&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Trail of Bits&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1rcs…7sw8&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; for the audit, and Alpha-Omega for supporting rapid remediation. Find the full report on the Trail of Bits publication page. #Python&lt;br/&gt;&lt;a href=&#34;https://blog.pypi.org/posts/2026-04-16-pypi-completes-second-audit/&#34;&gt;https://blog.pypi.org/posts/2026-04-16-pypi-completes-second-audit/&lt;/a&gt;
    </content>
    <updated>2026-04-16T13:26:36Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9d02asgznaw5avj26nw04mwp09jlg56vmv7nzxuus0089avf5w8czypz3gt0ewksckqvx57pcjkklp7xegq2mzeh29ssp8a7fjdjcgg7duxwp8aj</id>
    
      <title type="html">A campaign targeted GitHub Actions to steal PyPI tokens—PyPI ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9d02asgznaw5avj26nw04mwp09jlg56vmv7nzxuus0089avf5w8czypz3gt0ewksckqvx57pcjkklp7xegq2mzeh29ssp8a7fjdjcgg7duxwp8aj" />
    <content type="html">
      A campaign targeted GitHub Actions to steal PyPI tokens—PyPI wasn’t compromised and no PyPI packages were published by the attackers. Stay safe: review your tokens, rotate any exposed ones, and use short-lived, scoped GitHub Actions tokens. Details:&lt;br/&gt;&lt;a href=&#34;https://blog.pypi.org/posts/2025-09-16-github-actions-token-exfiltration/&#34;&gt;https://blog.pypi.org/posts/2025-09-16-github-actions-token-exfiltration/&lt;/a&gt;
    </content>
    <updated>2025-09-26T12:45:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqejyq07f4dennjye3j9x8cz2240e7kdrtuerqsnk660nscqqa2qszypz3gt0ewksckqvx57pcjkklp7xegq2mzeh29ssp8a7fjdjcgg7dufdnqsn</id>
    
      <title type="html">PyPI now checks for expired domains to prevent domain ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqejyq07f4dennjye3j9x8cz2240e7kdrtuerqsnk660nscqqa2qszypz3gt0ewksckqvx57pcjkklp7xegq2mzeh29ssp8a7fjdjcgg7dufdnqsn" />
    <content type="html">
      PyPI now checks for expired domains to prevent domain resurrection attacks, a type of supply-chain attack where someone buys an expired domain and uses it to take over #PyPI accounts through password resets. #Python #OpenSource #SupplyChain #Security&lt;br/&gt;&lt;a href=&#34;https://blog.pypi.org/posts/2025-08-18-preventing-domain-resurrections/&#34;&gt;https://blog.pypi.org/posts/2025-08-18-preventing-domain-resurrections/&lt;/a&gt;
    </content>
    <updated>2025-08-18T17:32:48Z</updated>
  </entry>

</feed>