Skip to content
← Blog

Category

Security research

5 posts in this category.

  • Security research

    Typosquat naming patterns on PyPI: a taxonomy

    PyPI typosquats follow a small set of recurring patterns: transposition, omission, hyphenation variants, prefix and suffix insertion, abandoned-name resurrection. Here is the catalog and what each pattern looks like in the wild.

    3 min read

  • Security research

    How long do malicious npm packages stay live?

    A research note on detection latency for malicious npm packages: median windows of hours for high-profile cases, days-to-weeks for the long tail, with the data caveats. The implication for defense planning is structural.

    4 min read

  • Security research

    Maintainer account compromise: how attackers actually get in

    A taxonomy of the vectors observed across documented npm and PyPI account-takeover incidents: phishing, credential reuse, expired domains, session-token theft, OAuth grants, and social-engineered handoffs. Each with what mitigates it.

    5 min read

  • Security research

    The cooling period as defense: academic foundations

    The cooling-period idea — refuse to install brand-new versions until they have been published long enough and observed enough — has a long history in academic literature. Here are the threads of research and why two thresholds beat one.

    5 min read