Charlie Bedard

Sour Pickles

Authored by Md Abdullahil Kafi, secure software engineer at OpenRefactory. Edited by Charlie Bedard Introduction   Pickle vulnerabilities are so widespread that it has become common knowledge in the Python world similar to the buffer overflow vulnerability in the C world. Recently, our team found a deserialization issue (CWE 502: Deserialization of untrusted data) in …

Sour Pickles Read More »

Securing Software Supply Chains With The Six ‘F’ Strategies

Authored by Md Abdullahil Kafi, secure software engineer at OpenRefactory. Edited by Charlie Bedard The ‘F’ Frameworks Michael Winser of the Alpha-Omega project recently wrote a blog on the Three F framework for managing the risk coming from the open source dependencies. Here is a list of the key points made in that article. Open …

Securing Software Supply Chains With The Six ‘F’ Strategies Read More »

How Good is DeepSeek in Driving An Agentic Architecture? – A Comparative Case Study

Saadman Ahmed, Md Shoaib Shahriar Ibrahim and Munawar Hafiz of OpenRefactory write about how the DeepSeek R1 model compares with other LLM models when they are used in driving an AI agent. Edited by Charlie Bedard DeepSeek has swept the world technology news in the last couple of weeks. It brings in new ways of …

How Good is DeepSeek in Driving An Agentic Architecture? – A Comparative Case Study Read More »

One Ring to Rule Them All

Munawar Hafiz, CEO of OpenRefactory, writes about how a simple mistake can result in critical supply chain attacks. Edited by Charlie Bedard. On June 28, JFrog’s Brian Moussalli reported a leaked GitHub Personal Access Token (PAT) belonging to Ee Durbin (@ewdurbin), the Administrator of PyPI. Quoting from the incident report, “This token was immediately revoked, …

One Ring to Rule Them All Read More »

The Benefits of Knowing the Future

Munawar Hafiz, CEO of OpenRefactory, writes about the benefits of proactive vulnerability management strategies, including the potential advantage of knowing about bugs before they become public CVEs. Edited by Charlie Bedard. Three Vulnerabilities with Different Impacts We encounter security vulnerabilities every day. Some we are able to dodge while others leave a major impact. We’ll …

The Benefits of Knowing the Future Read More »