Software supply chain = everything between an upstream maintainer's keyboard and your import statement: source repos, package registries, build systems, CI runners, and the credentials they hold. A compromise anywhere on that path lands code on your machine.
Part 1
Threat Landscape
Major incidents from the last 12 months — GitHub, npm, PyPI, GitHub Actions & AI-powered threats
Part 2
Practical Mitigations
What you can do as a consumer and publisher of open-source packages
Part 3
Hardened Workflows
Ready-to-use npm and PyPI release workflows with defense-in-depth
"Research environments often lack the dedicated infrastructure and support needed to prioritize security — yet research code faces mounting risks."