
blog.phylum.io/devious-python-build-requirements
Preview meta tags from the blog.phylum.io website.
Linked Hostnames
18- 12 links toblog.phylum.io
- 5 links todocs.phylum.io
- 5 links togithub.com
- 4 links topeps.python.org
- 3 links todoc.rust-lang.org
- 3 links topip.pypa.io
- 2 links tounsplash.com
- 2 links towww.phylum.io
Thumbnail

Search Engine Appearance
https://blog.phylum.io/devious-python-build-requirements
Devious Python Build Requirements | Phylum
Build requirements in Python source distributions allow attackers to execute arbitrary code in an isolated build environment that is automatically deleted after use.
Bing
Devious Python Build Requirements | Phylum
https://blog.phylum.io/devious-python-build-requirements
Build requirements in Python source distributions allow attackers to execute arbitrary code in an isolated build environment that is automatically deleted after use.
DuckDuckGo

Devious Python Build Requirements | Phylum
Build requirements in Python source distributions allow attackers to execute arbitrary code in an isolated build environment that is automatically deleted after use.
General Meta Tags
10- titleDevious Python Build Requirements | Phylum
- charsetutf-8
- viewportwidth=device-width, initial-scale=1
- descriptionBuild requirements in Python source distributions allow attackers to execute arbitrary code in an isolated build environment that is automatically deleted after use.
- referrerno-referrer-when-downgrade
Open Graph Meta Tags
8- og:site_namePhylum Research | Software Supply Chain Security
- og:typearticle
- og:titleDevious Python Build Requirements | Phylum
- og:descriptionBuild requirements in Python source distributions allow attackers to execute arbitrary code in an isolated build environment that is automatically deleted after use.
- og:urlhttps://blog.phylum.io/devious-python-build-requirements/
Twitter Meta Tags
10- twitter:cardsummary_large_image
- twitter:titleDevious Python Build Requirements | Phylum
- twitter:descriptionBuild requirements in Python source distributions allow attackers to execute arbitrary code in an isolated build environment that is automatically deleted after use.
- twitter:urlhttps://blog.phylum.io/devious-python-build-requirements/
- twitter:imagehttps://blog.phylum.io/content/images/size/w1200/2024/04/photo-1628313388777-9b9a751dfc6a.jpeg
Link Tags
13- alternatehttps://blog.phylum.io/rss/
- canonicalhttps://blog.phylum.io/devious-python-build-requirements/
- iconhttps://blog.phylum.io/content/images/size/w256h256/2023/03/phylum-logo.png
- preconnecthttps://fonts.googleapis.com
- preconnecthttps://fonts.gstatic.com
Links
46- https://blog.phylum.io/2025-trends-predictions-ai-shadow-application-development-and-nation-state-attacks
- https://blog.phylum.io/author/charles-coggins
- https://blog.phylum.io/bad-beat-poetry
- https://blog.phylum.io/dormant-pypi-package-updated-to-deploy-novasentinel-stealer
- https://blog.phylum.io/how-malicious-python-code-gains-execution