<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 12 May 2026 05:17:20 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>PodRocket - Episodes Tagged with “Security”</title>
    <link>https://podrocket.logrocket.com/tags/security</link>
    <pubDate>Thu, 23 Apr 2026 08:00:00 -0400</pubDate>
    <description>PodRocket covers everything you need to know about frontend web development on a weekly basis. Join our hosts as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A web development podcast from LogRocket</itunes:subtitle>
    <itunes:author>LogRocket</itunes:author>
    <itunes:summary>PodRocket covers everything you need to know about frontend web development on a weekly basis. Join our hosts as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>front-end, web development, front-end development, frontend development, tech, </itunes:keywords>
    <itunes:owner>
      <itunes:name>LogRocket</itunes:name>
      <itunes:email>elizabeth.becz@logrocket.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<item>
  <title>Cloudflare's Next.js rewrite, AI security chaos, and developer brain fry</title>
  <link>http://podrocket.logrocket.com/cloudflares-nextjs-rewrite-ai-security-chaos-and-developer-brain-fry</link>
  <guid isPermaLink="false">86a8e7ae-6086-4864-8336-1919f524da06</guid>
  <pubDate>Thu, 23 Apr 2026 08:00:00 -0400</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/86a8e7ae-6086-4864-8336-1919f524da06.mp3" length="99752408" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>The panel digs into the Cloudflare vs Vercel turf war over Next.js, breaking down what it really means that one engineer vibe coded a full framework rewrite in a week for $1,100 using Claude Code. Then things get spicy: from the Lovable data breach to an early Anthropic model escaping its sandbox, the crew debates whether the wave of AI security incidents is systemic, and what the build vs buy collapse means for developers rolling their own tools in the AI agent era.</itunes:subtitle>
  <itunes:duration>40:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/8/86a8e7ae-6086-4864-8336-1919f524da06/cover.jpg?v=1"/>
  <description>&lt;p&gt;The panel digs into the Cloudflare vs Vercel turf war over Next.js, breaking down what it really means that one engineer vibe coded a full framework rewrite in a week for $1,100 using Claude Code. Then things get spicy: from the Lovable data breach to an early Anthropic model escaping its sandbox, the crew debates whether the wave of AI security incidents is systemic, and what the build vs buy collapse means for developers rolling their own tools in the AI agent era.&lt;/p&gt;

&lt;h3&gt;Resources&lt;/h3&gt;

&lt;p&gt;One Engineer, One AI, One Week: Cloudflare Just Rebuilt Next.js: &lt;a href="https://bytesizedbets.com/p/one-engineer-one-ai-one-week-cloudflare" target="_blank" rel="nofollow noopener"&gt;https://bytesizedbets.com/p/one-engineer-one-ai-one-week-cloudflare&lt;/a&gt;&lt;br&gt;
Cloudflare's vibe-coded Next.js replacement starts a turf war: &lt;a href="https://cybernews.com/security/hackers-find-critical-flaws-in-cloudflares-nextjs-alternative/" target="_blank" rel="nofollow noopener"&gt;https://cybernews.com/security/hackers-find-critical-flaws-in-cloudflares-nextjs-alternative/&lt;/a&gt;&lt;br&gt;
How we rebuilt Next.js with AI in one week: &lt;a href="https://blog.cloudflare.com/vinext/" target="_blank" rel="nofollow noopener"&gt;https://blog.cloudflare.com/vinext/&lt;/a&gt;&lt;br&gt;
JavaScript survey reveals gripes against Next.js: &lt;a href="https://www.devclass.com/development/2026/02/10/javascript-survey-reveals-gripes-against-date-handling-webpack-and-nextjs-and-that-typescript-has-won/4090262" target="_blank" rel="nofollow noopener"&gt;https://www.devclass.com/development/2026/02/10/javascript-survey-reveals-gripes-against-date-handling-webpack-and-nextjs-and-that-typescript-has-won/4090262&lt;/a&gt;&lt;br&gt;
Claude Code's source code appears to have leaked — here's what we know: &lt;a href="https://venturebeat.com/technology/claude-codes-source-code-appears-to-have-leaked-heres-what-we-know" target="_blank" rel="nofollow noopener"&gt;https://venturebeat.com/technology/claude-codes-source-code-appears-to-have-leaked-heres-what-we-know&lt;/a&gt;&lt;br&gt;
Anthropic accidentally exposes Claude Code source code: &lt;a href="https://www.theregister.com/2026/03/31/anthropic_claude_code_source_code/" target="_blank" rel="nofollow noopener"&gt;https://www.theregister.com/2026/03/31/anthropic_claude_code_source_code/&lt;/a&gt;&lt;br&gt;
Claude Mythos Preview (Anthropic Red Team blog): &lt;a href="https://red.anthropic.com/2026/mythos-preview/" target="_blank" rel="nofollow noopener"&gt;https://red.anthropic.com/2026/mythos-preview/&lt;/a&gt;&lt;br&gt;
Claude Mythos Preview — BBC coverage: &lt;a href="https://www.bbc.com/news/articles/crk1py1jgzko" target="_blank" rel="nofollow noopener"&gt;https://www.bbc.com/news/articles/crk1py1jgzko&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;We want to hear from you!&lt;/h3&gt;

&lt;p&gt;How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fill out our &lt;a href="https://t.co/oKVAEXipxu" target="_blank" rel="nofollow noopener"&gt;listener survey&lt;/a&gt;!&lt;/strong&gt; &lt;a href="https://t.co/oKVAEXipxu" target="_blank" rel="nofollow noopener"&gt;https://t.co/oKVAEXipxu&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let us know by sending an email to our producer, Elizabeth, at &lt;a href="mailto:elizabeth.becz@logrocket.com" target="_blank" rel="nofollow noopener"&gt;elizabeth.becz@logrocket.com&lt;/a&gt;, or tweet at us at &lt;a href="https://twitter.com/PodRocketpod" target="_blank" rel="nofollow noopener"&gt;PodRocketPod&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Check out our &lt;a href="https://blog.logrocket.com/the-replay-newsletter/" target="_blank" rel="nofollow noopener"&gt;newsletter&lt;/a&gt;!&lt;/strong&gt; &lt;a href="https://blog.logrocket.com/the-replay-newsletter/" target="_blank" rel="nofollow noopener"&gt;https://blog.logrocket.com/the-replay-newsletter/&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Follow us. Get free stickers.&lt;/h3&gt;

&lt;p&gt;Follow us on Apple Podcasts, fill out this &lt;a href="https://podrocket.logrocket.com/get-podrocket-stickers" target="_blank" rel="nofollow noopener"&gt;form&lt;/a&gt;, and we’ll send you free PodRocket stickers!&lt;/p&gt;

&lt;h3&gt;What does LogRocket do?&lt;/h3&gt;

&lt;p&gt;LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. &lt;a href="https://logrocket.com/signup/?pdr" target="_blank" rel="nofollow noopener"&gt;Try LogRocket for free today.&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Chapters&lt;/h3&gt;

&lt;p&gt;00:00 Introduction &amp;amp; Panelist Welcome&lt;br&gt;
02:00 Cloudflare Rewrote Next.js for $1,100 — Does It Matter?&lt;br&gt;
06:30 Vercel Lock-In, Open Next &amp;amp; the Adapter Debate&lt;br&gt;
09:00 AI Security Incidents — Lovable, Anthropic Source Code Leak &amp;amp; More&lt;br&gt;
12:30 Is the Security Crisis Systemic or a People Problem?&lt;br&gt;
16:00 Rolling Your Own Stack With AI Is a Terrible Idea&lt;br&gt;
18:30 Mythos, Zero-Day Bugs &amp;amp; Anthropic's Security Credibility&lt;br&gt;
22:00 Is Anthropic's "Safety First" Framing Just Marketing?&lt;br&gt;
26:00 Fleet Management, Agent Burnout &amp;amp; Brain Fry&lt;br&gt;
28:30 Hot Take — Noel: Software Is Getting Worse and AI Is to Blame&lt;br&gt;
32:30 Hot Take — Paul: The Second Internet &amp;amp; Claude Code's Future&lt;br&gt;
36:30 Hot Take — Jack: The Highlander Reboot Is Going to Slap&lt;br&gt;
37:30 Hot Take — Paige: Think Before You Grant OAuth Permissions&lt;br&gt;
40:00 Wrapping Up Special Guest: Jack Herrington.&lt;/p&gt;
</description>
  <itunes:keywords>Cloudflare vs Vercel, Next.js, Claude Code, AI security, vibe coding, Anthropic, AI agents, web development, developer tools, open source, Cloudflare v-next Next.js rewrite, trusting AI written code, vibe coding security risks, AI agent fleet management, build vs buy developer tools, Anthropic safety first AI lab, Claude Code vs py agents, AI code security incidents, vendor lock-in Next.js Vercel, software quality AI era</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>The panel digs into the Cloudflare vs Vercel turf war over Next.js, breaking down what it really means that one engineer vibe coded a full framework rewrite in a week for $1,100 using Claude Code. Then things get spicy: from the Lovable data breach to an early Anthropic model escaping its sandbox, the crew debates whether the wave of AI security incidents is systemic, and what the build vs buy collapse means for developers rolling their own tools in the AI agent era.</p>

<h3>Resources</h3>

<p>One Engineer, One AI, One Week: Cloudflare Just Rebuilt Next.js: <a href="https://bytesizedbets.com/p/one-engineer-one-ai-one-week-cloudflare" rel="nofollow">https://bytesizedbets.com/p/one-engineer-one-ai-one-week-cloudflare</a><br>
Cloudflare&#39;s vibe-coded Next.js replacement starts a turf war: <a href="https://cybernews.com/security/hackers-find-critical-flaws-in-cloudflares-nextjs-alternative/" rel="nofollow">https://cybernews.com/security/hackers-find-critical-flaws-in-cloudflares-nextjs-alternative/</a><br>
How we rebuilt Next.js with AI in one week: <a href="https://blog.cloudflare.com/vinext/" rel="nofollow">https://blog.cloudflare.com/vinext/</a><br>
JavaScript survey reveals gripes against Next.js: <a href="https://www.devclass.com/development/2026/02/10/javascript-survey-reveals-gripes-against-date-handling-webpack-and-nextjs-and-that-typescript-has-won/4090262" rel="nofollow">https://www.devclass.com/development/2026/02/10/javascript-survey-reveals-gripes-against-date-handling-webpack-and-nextjs-and-that-typescript-has-won/4090262</a><br>
Claude Code&#39;s source code appears to have leaked — here&#39;s what we know: <a href="https://venturebeat.com/technology/claude-codes-source-code-appears-to-have-leaked-heres-what-we-know" rel="nofollow">https://venturebeat.com/technology/claude-codes-source-code-appears-to-have-leaked-heres-what-we-know</a><br>
Anthropic accidentally exposes Claude Code source code: <a href="https://www.theregister.com/2026/03/31/anthropic_claude_code_source_code/" rel="nofollow">https://www.theregister.com/2026/03/31/anthropic_claude_code_source_code/</a><br>
Claude Mythos Preview (Anthropic Red Team blog): <a href="https://red.anthropic.com/2026/mythos-preview/" rel="nofollow">https://red.anthropic.com/2026/mythos-preview/</a><br>
Claude Mythos Preview — BBC coverage: <a href="https://www.bbc.com/news/articles/crk1py1jgzko" rel="nofollow">https://www.bbc.com/news/articles/crk1py1jgzko</a></p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <a href="https://t.co/oKVAEXipxu" rel="nofollow">https://t.co/oKVAEXipxu</a></p>

<p>Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabeth.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<p><strong>Check out our <a href="https://blog.logrocket.com/the-replay-newsletter/" rel="nofollow">newsletter</a>!</strong> <a href="https://blog.logrocket.com/the-replay-newsletter/" rel="nofollow">https://blog.logrocket.com/the-replay-newsletter/</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p>

<h3>Chapters</h3>

<p>00:00 Introduction &amp; Panelist Welcome<br>
02:00 Cloudflare Rewrote Next.js for $1,100 — Does It Matter?<br>
06:30 Vercel Lock-In, Open Next &amp; the Adapter Debate<br>
09:00 AI Security Incidents — Lovable, Anthropic Source Code Leak &amp; More<br>
12:30 Is the Security Crisis Systemic or a People Problem?<br>
16:00 Rolling Your Own Stack With AI Is a Terrible Idea<br>
18:30 Mythos, Zero-Day Bugs &amp; Anthropic&#39;s Security Credibility<br>
22:00 Is Anthropic&#39;s &quot;Safety First&quot; Framing Just Marketing?<br>
26:00 Fleet Management, Agent Burnout &amp; Brain Fry<br>
28:30 Hot Take — Noel: Software Is Getting Worse and AI Is to Blame<br>
32:30 Hot Take — Paul: The Second Internet &amp; Claude Code&#39;s Future<br>
36:30 Hot Take — Jack: The Highlander Reboot Is Going to Slap<br>
37:30 Hot Take — Paige: Think Before You Grant OAuth Permissions<br>
40:00 Wrapping Up</p><p>Special Guest: Jack Herrington.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The panel digs into the Cloudflare vs Vercel turf war over Next.js, breaking down what it really means that one engineer vibe coded a full framework rewrite in a week for $1,100 using Claude Code. Then things get spicy: from the Lovable data breach to an early Anthropic model escaping its sandbox, the crew debates whether the wave of AI security incidents is systemic, and what the build vs buy collapse means for developers rolling their own tools in the AI agent era.</p>

<h3>Resources</h3>

<p>One Engineer, One AI, One Week: Cloudflare Just Rebuilt Next.js: <a href="https://bytesizedbets.com/p/one-engineer-one-ai-one-week-cloudflare" rel="nofollow">https://bytesizedbets.com/p/one-engineer-one-ai-one-week-cloudflare</a><br>
Cloudflare&#39;s vibe-coded Next.js replacement starts a turf war: <a href="https://cybernews.com/security/hackers-find-critical-flaws-in-cloudflares-nextjs-alternative/" rel="nofollow">https://cybernews.com/security/hackers-find-critical-flaws-in-cloudflares-nextjs-alternative/</a><br>
How we rebuilt Next.js with AI in one week: <a href="https://blog.cloudflare.com/vinext/" rel="nofollow">https://blog.cloudflare.com/vinext/</a><br>
JavaScript survey reveals gripes against Next.js: <a href="https://www.devclass.com/development/2026/02/10/javascript-survey-reveals-gripes-against-date-handling-webpack-and-nextjs-and-that-typescript-has-won/4090262" rel="nofollow">https://www.devclass.com/development/2026/02/10/javascript-survey-reveals-gripes-against-date-handling-webpack-and-nextjs-and-that-typescript-has-won/4090262</a><br>
Claude Code&#39;s source code appears to have leaked — here&#39;s what we know: <a href="https://venturebeat.com/technology/claude-codes-source-code-appears-to-have-leaked-heres-what-we-know" rel="nofollow">https://venturebeat.com/technology/claude-codes-source-code-appears-to-have-leaked-heres-what-we-know</a><br>
Anthropic accidentally exposes Claude Code source code: <a href="https://www.theregister.com/2026/03/31/anthropic_claude_code_source_code/" rel="nofollow">https://www.theregister.com/2026/03/31/anthropic_claude_code_source_code/</a><br>
Claude Mythos Preview (Anthropic Red Team blog): <a href="https://red.anthropic.com/2026/mythos-preview/" rel="nofollow">https://red.anthropic.com/2026/mythos-preview/</a><br>
Claude Mythos Preview — BBC coverage: <a href="https://www.bbc.com/news/articles/crk1py1jgzko" rel="nofollow">https://www.bbc.com/news/articles/crk1py1jgzko</a></p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <a href="https://t.co/oKVAEXipxu" rel="nofollow">https://t.co/oKVAEXipxu</a></p>

<p>Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabeth.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<p><strong>Check out our <a href="https://blog.logrocket.com/the-replay-newsletter/" rel="nofollow">newsletter</a>!</strong> <a href="https://blog.logrocket.com/the-replay-newsletter/" rel="nofollow">https://blog.logrocket.com/the-replay-newsletter/</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p>

<h3>Chapters</h3>

<p>00:00 Introduction &amp; Panelist Welcome<br>
02:00 Cloudflare Rewrote Next.js for $1,100 — Does It Matter?<br>
06:30 Vercel Lock-In, Open Next &amp; the Adapter Debate<br>
09:00 AI Security Incidents — Lovable, Anthropic Source Code Leak &amp; More<br>
12:30 Is the Security Crisis Systemic or a People Problem?<br>
16:00 Rolling Your Own Stack With AI Is a Terrible Idea<br>
18:30 Mythos, Zero-Day Bugs &amp; Anthropic&#39;s Security Credibility<br>
22:00 Is Anthropic&#39;s &quot;Safety First&quot; Framing Just Marketing?<br>
26:00 Fleet Management, Agent Burnout &amp; Brain Fry<br>
28:30 Hot Take — Noel: Software Is Getting Worse and AI Is to Blame<br>
32:30 Hot Take — Paul: The Second Internet &amp; Claude Code&#39;s Future<br>
36:30 Hot Take — Jack: The Highlander Reboot Is Going to Slap<br>
37:30 Hot Take — Paige: Think Before You Grant OAuth Permissions<br>
40:00 Wrapping Up</p><p>Special Guest: Jack Herrington.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>React got hacked with David Mytton</title>
  <link>http://podrocket.logrocket.com/react2shell-javascript-security-wake-up-call-david-mytton</link>
  <guid isPermaLink="false">7c2d0dc8-3318-4c56-a5c6-6f82972df765</guid>
  <pubDate>Tue, 16 Dec 2025 08:00:00 -0500</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/7c2d0dc8-3318-4c56-a5c6-6f82972df765.mp3" length="92777567" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>In this episode, Noel sits down with David Mytton, founder and CEO of Arcjet, to unpack the React2Shell vulnerability and why it became such a serious remote code execution risk for apps using React server components and Next.js. They explain how server-side features introduced in React 19 changed the attack surface, why cloud providers leaned on WAF mitigation instead of instant patching, and what this incident reveals about modern JavaScript supply chain risk. The conversation also covers dependency sprawl, rushed patches, and why security as a feature needs to start long before production.</itunes:subtitle>
  <itunes:duration>37:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/7/7c2d0dc8-3318-4c56-a5c6-6f82972df765/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode, Noel sits down with David Mytton, founder and CEO of Arcjet, to unpack the React2Shell vulnerability and why it became such a serious remote code execution risk for apps using React server components and Next.js. They explain how server-side features introduced in React 19 changed the attack surface, why cloud providers leaned on WAF mitigation instead of instant patching, and what this incident reveals about modern JavaScript supply chain risk. The conversation also covers dependency sprawl, rushed patches, and why security as a feature needs to start long before production.&lt;/p&gt;

&lt;h3&gt;Links&lt;/h3&gt;

&lt;p&gt;X: &lt;a href="https://x.com/davidmytton" target="_blank" rel="nofollow noopener"&gt;https://x.com/davidmytton&lt;/a&gt;&lt;br&gt;
Blog: &lt;a href="https://davidmytton.blog" target="_blank" rel="nofollow noopener"&gt;https://davidmytton.blog&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Resources&lt;/h3&gt;

&lt;p&gt;Multiple Threat Actors Exploit React2Shell: &lt;a href="https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182" target="_blank" rel="nofollow noopener"&gt;https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;We want to hear from you!&lt;/h3&gt;

&lt;p&gt;How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fill out our &lt;a href="https://t.co/oKVAEXipxu" target="_blank" rel="nofollow noopener"&gt;listener survey&lt;/a&gt;!&lt;/strong&gt; &lt;a href="https://t.co/oKVAEXipxu" target="_blank" rel="nofollow noopener"&gt;https://t.co/oKVAEXipxu&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let us know by sending an email to our producer, Elizabeth, at &lt;a href="mailto:elizabeth.becz@logrocket.com" target="_blank" rel="nofollow noopener"&gt;elizabeth.becz@logrocket.com&lt;/a&gt;, or tweet at us at &lt;a href="https://twitter.com/PodRocketpod" target="_blank" rel="nofollow noopener"&gt;PodRocketPod&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Check out our &lt;a href="https://blog.logrocket.com/the-replay-newsletter/" target="_blank" rel="nofollow noopener"&gt;newsletter&lt;/a&gt;!&lt;/strong&gt; &lt;a href="https://blog.logrocket.com/the-replay-newsletter/" target="_blank" rel="nofollow noopener"&gt;https://blog.logrocket.com/the-replay-newsletter/&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Follow us. Get free stickers.&lt;/h3&gt;

&lt;p&gt;Follow us on Apple Podcasts, fill out this &lt;a href="https://podrocket.logrocket.com/get-podrocket-stickers" target="_blank" rel="nofollow noopener"&gt;form&lt;/a&gt;, and we’ll send you free PodRocket stickers!&lt;/p&gt;

&lt;h3&gt;What does LogRocket do?&lt;/h3&gt;

&lt;p&gt;LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. &lt;a href="https://logrocket.com/signup/?pdr" target="_blank" rel="nofollow noopener"&gt;Try LogRocket for free today.&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Chapters&lt;/h3&gt;
</description>
  <itunes:keywords>React to Shell vulnerability, React2Shell, React2Shell vulnerability, Reactor Shell vulnerability, React security, React 19, Next.js security, Next.js 15, Next.js 14, Next.js 13, React server components, server functions, server actions, remote code execution, environment variables, crypto miners, data exfiltration, internal infrastructure requests, web application firewall, WAF mitigation, supply chain issues, npm supply chain attacks, Shai-Hulud attacks, dependency tree explosion, dependency updates, semantic versioning, npm install scripts, npm ci, package-lock, GitHub security alerts, Socket security tool, Vercel, Netlify, AWS, Google Cloud, Cloudflare, runtime mitigations, bug bounty program, dev containers, password manager secrets, outbound firewall, secure by design, security as a feature</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode, Noel sits down with David Mytton, founder and CEO of Arcjet, to unpack the React2Shell vulnerability and why it became such a serious remote code execution risk for apps using React server components and Next.js. They explain how server-side features introduced in React 19 changed the attack surface, why cloud providers leaned on WAF mitigation instead of instant patching, and what this incident reveals about modern JavaScript supply chain risk. The conversation also covers dependency sprawl, rushed patches, and why security as a feature needs to start long before production.</p>

<h3>Links</h3>

<p>X: <a href="https://x.com/davidmytton" rel="nofollow">https://x.com/davidmytton</a><br>
Blog: <a href="https://davidmytton.blog" rel="nofollow">https://davidmytton.blog</a></p>

<h3>Resources</h3>

<p>Multiple Threat Actors Exploit React2Shell: <a href="https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182" rel="nofollow">https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182</a></p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <a href="https://t.co/oKVAEXipxu" rel="nofollow">https://t.co/oKVAEXipxu</a></p>

<p>Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabeth.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<p><strong>Check out our <a href="https://blog.logrocket.com/the-replay-newsletter/" rel="nofollow">newsletter</a>!</strong> <a href="https://blog.logrocket.com/the-replay-newsletter/" rel="nofollow">https://blog.logrocket.com/the-replay-newsletter/</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p>

<h3>Chapters</h3>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode, Noel sits down with David Mytton, founder and CEO of Arcjet, to unpack the React2Shell vulnerability and why it became such a serious remote code execution risk for apps using React server components and Next.js. They explain how server-side features introduced in React 19 changed the attack surface, why cloud providers leaned on WAF mitigation instead of instant patching, and what this incident reveals about modern JavaScript supply chain risk. The conversation also covers dependency sprawl, rushed patches, and why security as a feature needs to start long before production.</p>

<h3>Links</h3>

<p>X: <a href="https://x.com/davidmytton" rel="nofollow">https://x.com/davidmytton</a><br>
Blog: <a href="https://davidmytton.blog" rel="nofollow">https://davidmytton.blog</a></p>

<h3>Resources</h3>

<p>Multiple Threat Actors Exploit React2Shell: <a href="https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182" rel="nofollow">https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182</a></p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <a href="https://t.co/oKVAEXipxu" rel="nofollow">https://t.co/oKVAEXipxu</a></p>

<p>Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabeth.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<p><strong>Check out our <a href="https://blog.logrocket.com/the-replay-newsletter/" rel="nofollow">newsletter</a>!</strong> <a href="https://blog.logrocket.com/the-replay-newsletter/" rel="nofollow">https://blog.logrocket.com/the-replay-newsletter/</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p>

<h3>Chapters</h3>]]>
  </itunes:summary>
</item>
<item>
  <title>Google’s antitrust win, AI mandates, npm attacks and robots.txt</title>
  <link>http://podrocket.logrocket.com/googles-antitrust-win-ai-mandates-npm-attacks-robots-txt</link>
  <guid isPermaLink="false">94e1df24-d1a0-4ea1-983d-0b3085486c50</guid>
  <pubDate>Thu, 25 Sep 2025 08:00:00 -0400</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/94e1df24-d1a0-4ea1-983d-0b3085486c50.mp3" length="98837888" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>Is the web breaking under the weight of AI crawlers, platform consolidation, and nonstop security breaches? We dive into the state of browsers, developer burnout, and whether tech regulation can actually keep up.

In this panel discussion:

* We debate if robots.txt and AI licensing standards like RSL can realistically control how AI scrapes the web.

* The fallout from DIA’s acquisition by Atlassian and what it means for indie browser innovation in a Chromium-dominated world.

* Why Google’s antitrust victory might embolden other tech giants, and what that means for competition.

* How supply chain attacks like the NPM malware and Shai Hulud worm are exploiting GitHub workflows and package vulnerabilities.

* The pushback against AI mandates at work, including Coinbase’s controversial policy requiring developers to use Copilot.</itunes:subtitle>
  <itunes:duration>41:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/9/94e1df24-d1a0-4ea1-983d-0b3085486c50/cover.jpg?v=1"/>
  <description>&lt;p&gt;Is the web breaking under the weight of AI crawlers, platform consolidation, and nonstop security breaches? We dive into the state of browsers, developer burnout, and whether tech regulation can actually keep up.&lt;/p&gt;

&lt;p&gt;In this panel discussion:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;We debate if robots.txt and AI licensing standards like RSL can realistically control how AI scrapes the web.&lt;/li&gt;
&lt;li&gt;The fallout from DIA’s acquisition by Atlassian and what it means for indie browser innovation (like the Helium browser, Zen) in a Chromium-dominated world.&lt;/li&gt;
&lt;li&gt;Why Google’s antitrust victory might embolden other tech giants, and what that means for competition.&lt;/li&gt;
&lt;li&gt;How supply chain attacks like the NPM malware and Shai Hulud worm are exploiting GitHub workflows and package vulnerabilities.&lt;/li&gt;
&lt;li&gt;The pushback against AI mandates at work, including Coinbase’s controversial policy requiring developers to use Copilot.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Resources&lt;/h3&gt;

&lt;p&gt;Inside the battle for the future of the web: &lt;a href="https://www.businessinsider.com/google-microsoft-openai-fight-standards-limit-ai-access-websites-2025-9" target="_blank" rel="nofollow noopener"&gt;https://www.businessinsider.com/google-microsoft-openai-fight-standards-limit-ai-access-websites-2025-9&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;The web has a new system for making AI companies pay up: &lt;a href="https://www.theverge.com/news/775072/rsl-standard-licensing-ai-publishing-reddit-yahoo-medium" target="_blank" rel="nofollow noopener"&gt;https://www.theverge.com/news/775072/rsl-standard-licensing-ai-publishing-reddit-yahoo-medium&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;The Browser Company, maker of Arc and Dia, is being acquired: &lt;a href="https://www.theverge.com/web/770947/browser-company-arc-dia-acquired-atlassian" target="_blank" rel="nofollow noopener"&gt;https://www.theverge.com/web/770947/browser-company-arc-dia-acquired-atlassian&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Google stock jumps 8% after search giant avoids worst-case penalties in antitrust case: &lt;a href="https://www.cnbc.com/2025/09/02/google-antitrust-search-ruling.html" target="_blank" rel="nofollow noopener"&gt;https://www.cnbc.com/2025/09/02/google-antitrust-search-ruling.html&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Massive data breach sees 16 million PayPal accounts leaked online - here's what we know, and how to stay safe:&lt;a href="https://www.techradar.com/pro/massive-data-breach-sees-16-million-paypal-accounts-leaked-online-heres-what-we-know-and-how-to-stay-safe" target="_blank" rel="nofollow noopener"&gt;https://www.techradar.com/pro/massive-data-breach-sees-16-million-paypal-accounts-leaked-online-heres-what-we-know-and-how-to-stay-safe&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;PayPal’s Glitch Puts €10 Billion on Ice Across European Banks: &lt;a href="https://fintechnews.ch/payments/paypal-glitch-freezes-european-banks-10-billion-transactions/77974/" target="_blank" rel="nofollow noopener"&gt;https://fintechnews.ch/payments/paypal-glitch-freezes-european-banks-10-billion-transactions/77974/&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack: &lt;a href="https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack" target="_blank" rel="nofollow noopener"&gt;https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Compromised files replace npm packages with a combined 2 billion weekly downloads: &lt;a href="https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads" target="_blank" rel="nofollow noopener"&gt;https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware: &lt;a href="https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack" target="_blank" rel="nofollow noopener"&gt;https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Coinbase CEO explains why he fired engineers who didn’t try AI immediately: &lt;a href="https://techcrunch.com/2025/08/22/coinbase-ceo-explains-why-he-fired-engineers-who-didnt-try-ai-immediately/" target="_blank" rel="nofollow noopener"&gt;https://techcrunch.com/2025/08/22/coinbase-ceo-explains-why-he-fired-engineers-who-didnt-try-ai-immediately/&lt;/a&gt; &lt;/p&gt;

&lt;h3&gt;Chapters&lt;/h3&gt;

&lt;h3&gt;We want to hear from you!&lt;/h3&gt;

&lt;p&gt;How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fill out our &lt;a href="https://t.co/oKVAEXipxu" target="_blank" rel="nofollow noopener"&gt;listener survey&lt;/a&gt;!&lt;/strong&gt; &lt;br&gt;
Let us know by sending an email to our producer, Elizabeth, at &lt;a href="mailto:elizabeth.becz@logrocket.com" target="_blank" rel="nofollow noopener"&gt;elizabet.becz@logrocket.com&lt;/a&gt;, or tweet at us at &lt;a href="https://twitter.com/PodRocketpod" target="_blank" rel="nofollow noopener"&gt;PodRocketPod&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;Follow us. Get free stickers.&lt;/h3&gt;

&lt;p&gt;Follow us on Apple Podcasts, fill out this &lt;a href="https://podrocket.logrocket.com/get-podrocket-stickers" target="_blank" rel="nofollow noopener"&gt;form&lt;/a&gt;, and we’ll send you free PodRocket stickers!&lt;/p&gt;

&lt;h3&gt;What does LogRocket do?&lt;/h3&gt;

&lt;p&gt;LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. &lt;a href="https://logrocket.com/signup/?pdr" target="_blank" rel="nofollow noopener"&gt;Try LogRocket for free today.&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>Helium browser, AI training crawlers, robots.txt enforcement, AI content licensing, browser consolidation, DIA acquisition Atlassian, indie browser innovation, Ladybird browser, chromium dominance, Google antitrust ruling, tech regulation limits, platform consolidation, supply chain attacks, NPM malware, debug chalk breach, Shy Ude worm, GitHub secrets exfiltration, developer burnout AI, AI usage mandates, Coinbase AI coding, post-install script vulnerability, digital security breaches 2025, web security awareness</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Is the web breaking under the weight of AI crawlers, platform consolidation, and nonstop security breaches? We dive into the state of browsers, developer burnout, and whether tech regulation can actually keep up.</p>

<p>In this panel discussion:</p>

<ul>
<li>We debate if robots.txt and AI licensing standards like RSL can realistically control how AI scrapes the web.</li>
<li>The fallout from DIA’s acquisition by Atlassian and what it means for indie browser innovation (like the Helium browser, Zen) in a Chromium-dominated world.</li>
<li>Why Google’s antitrust victory might embolden other tech giants, and what that means for competition.</li>
<li>How supply chain attacks like the NPM malware and Shai Hulud worm are exploiting GitHub workflows and package vulnerabilities.</li>
<li>The pushback against AI mandates at work, including Coinbase’s controversial policy requiring developers to use Copilot.</li>
</ul>

<h3>Resources</h3>

<p>Inside the battle for the future of the web: <a href="https://www.businessinsider.com/google-microsoft-openai-fight-standards-limit-ai-access-websites-2025-9" rel="nofollow">https://www.businessinsider.com/google-microsoft-openai-fight-standards-limit-ai-access-websites-2025-9</a> </p>

<p>The web has a new system for making AI companies pay up: <a href="https://www.theverge.com/news/775072/rsl-standard-licensing-ai-publishing-reddit-yahoo-medium" rel="nofollow">https://www.theverge.com/news/775072/rsl-standard-licensing-ai-publishing-reddit-yahoo-medium</a> </p>

<p>The Browser Company, maker of Arc and Dia, is being acquired: <a href="https://www.theverge.com/web/770947/browser-company-arc-dia-acquired-atlassian" rel="nofollow">https://www.theverge.com/web/770947/browser-company-arc-dia-acquired-atlassian</a> </p>

<p>Google stock jumps 8% after search giant avoids worst-case penalties in antitrust case: <a href="https://www.cnbc.com/2025/09/02/google-antitrust-search-ruling.html" rel="nofollow">https://www.cnbc.com/2025/09/02/google-antitrust-search-ruling.html</a> </p>

<p>Massive data breach sees 16 million PayPal accounts leaked online - here&#39;s what we know, and how to stay safe:<a href="https://www.techradar.com/pro/massive-data-breach-sees-16-million-paypal-accounts-leaked-online-heres-what-we-know-and-how-to-stay-safe" rel="nofollow">https://www.techradar.com/pro/massive-data-breach-sees-16-million-paypal-accounts-leaked-online-heres-what-we-know-and-how-to-stay-safe</a> </p>

<p>PayPal’s Glitch Puts €10 Billion on Ice Across European Banks: <a href="https://fintechnews.ch/payments/paypal-glitch-freezes-european-banks-10-billion-transactions/77974/" rel="nofollow">https://fintechnews.ch/payments/paypal-glitch-freezes-european-banks-10-billion-transactions/77974/</a> </p>

<p>npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack: <a href="https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack" rel="nofollow">https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack</a></p>

<p>Compromised files replace npm packages with a combined 2 billion weekly downloads: <a href="https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads" rel="nofollow">https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads</a> </p>

<p>Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware: <a href="https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack" rel="nofollow">https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack</a> </p>

<p>Coinbase CEO explains why he fired engineers who didn’t try AI immediately: <a href="https://techcrunch.com/2025/08/22/coinbase-ceo-explains-why-he-fired-engineers-who-didnt-try-ai-immediately/" rel="nofollow">https://techcrunch.com/2025/08/22/coinbase-ceo-explains-why-he-fired-engineers-who-didnt-try-ai-immediately/</a> </p>

<h3>Chapters</h3>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <br>
Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabet.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Is the web breaking under the weight of AI crawlers, platform consolidation, and nonstop security breaches? We dive into the state of browsers, developer burnout, and whether tech regulation can actually keep up.</p>

<p>In this panel discussion:</p>

<ul>
<li>We debate if robots.txt and AI licensing standards like RSL can realistically control how AI scrapes the web.</li>
<li>The fallout from DIA’s acquisition by Atlassian and what it means for indie browser innovation (like the Helium browser, Zen) in a Chromium-dominated world.</li>
<li>Why Google’s antitrust victory might embolden other tech giants, and what that means for competition.</li>
<li>How supply chain attacks like the NPM malware and Shai Hulud worm are exploiting GitHub workflows and package vulnerabilities.</li>
<li>The pushback against AI mandates at work, including Coinbase’s controversial policy requiring developers to use Copilot.</li>
</ul>

<h3>Resources</h3>

<p>Inside the battle for the future of the web: <a href="https://www.businessinsider.com/google-microsoft-openai-fight-standards-limit-ai-access-websites-2025-9" rel="nofollow">https://www.businessinsider.com/google-microsoft-openai-fight-standards-limit-ai-access-websites-2025-9</a> </p>

<p>The web has a new system for making AI companies pay up: <a href="https://www.theverge.com/news/775072/rsl-standard-licensing-ai-publishing-reddit-yahoo-medium" rel="nofollow">https://www.theverge.com/news/775072/rsl-standard-licensing-ai-publishing-reddit-yahoo-medium</a> </p>

<p>The Browser Company, maker of Arc and Dia, is being acquired: <a href="https://www.theverge.com/web/770947/browser-company-arc-dia-acquired-atlassian" rel="nofollow">https://www.theverge.com/web/770947/browser-company-arc-dia-acquired-atlassian</a> </p>

<p>Google stock jumps 8% after search giant avoids worst-case penalties in antitrust case: <a href="https://www.cnbc.com/2025/09/02/google-antitrust-search-ruling.html" rel="nofollow">https://www.cnbc.com/2025/09/02/google-antitrust-search-ruling.html</a> </p>

<p>Massive data breach sees 16 million PayPal accounts leaked online - here&#39;s what we know, and how to stay safe:<a href="https://www.techradar.com/pro/massive-data-breach-sees-16-million-paypal-accounts-leaked-online-heres-what-we-know-and-how-to-stay-safe" rel="nofollow">https://www.techradar.com/pro/massive-data-breach-sees-16-million-paypal-accounts-leaked-online-heres-what-we-know-and-how-to-stay-safe</a> </p>

<p>PayPal’s Glitch Puts €10 Billion on Ice Across European Banks: <a href="https://fintechnews.ch/payments/paypal-glitch-freezes-european-banks-10-billion-transactions/77974/" rel="nofollow">https://fintechnews.ch/payments/paypal-glitch-freezes-european-banks-10-billion-transactions/77974/</a> </p>

<p>npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack: <a href="https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack" rel="nofollow">https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack</a></p>

<p>Compromised files replace npm packages with a combined 2 billion weekly downloads: <a href="https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads" rel="nofollow">https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads</a> </p>

<p>Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware: <a href="https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack" rel="nofollow">https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack</a> </p>

<p>Coinbase CEO explains why he fired engineers who didn’t try AI immediately: <a href="https://techcrunch.com/2025/08/22/coinbase-ceo-explains-why-he-fired-engineers-who-didnt-try-ai-immediately/" rel="nofollow">https://techcrunch.com/2025/08/22/coinbase-ceo-explains-why-he-fired-engineers-who-didnt-try-ai-immediately/</a> </p>

<h3>Chapters</h3>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <br>
Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabet.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Unpacking the NPM supply chain attacks with Feross Aboukhadijeh</title>
  <link>http://podrocket.logrocket.com/unpacking-npm-supply-chain-attacks-feross-aboukhadijeh</link>
  <guid isPermaLink="false">aa347acf-4511-4eba-a082-f865dc8e8948</guid>
  <pubDate>Tue, 23 Sep 2025 08:00:00 -0400</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/aa347acf-4511-4eba-a082-f865dc8e8948.mp3" length="96378368" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>Feross Aboukhadijeh, founder of Socket, joins us to break down the recent wave of NPM supply chain attacks hitting the JavaScript ecosystem, including how attackers used phishing to target developers, snuck malware into popular packages like Prettier and "is", and even abused tools like Claude, Gemini, and TruffleHog. 
We dig into how GitHub Actions vulnerabilities were exploited, what makes postinstall scripts risky, and and what you can do to protect yourself from future attacks.</itunes:subtitle>
  <itunes:duration>40:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/a/aa347acf-4511-4eba-a082-f865dc8e8948/cover.jpg?v=1"/>
  <description>&lt;p&gt;Feross Aboukhadijeh, founder of Socket, joins us to break down the recent wave of NPM supply chain attacks hitting the JavaScript ecosystem, including how attackers used phishing to target developers, snuck malware into popular packages like Prettier and "is", and even abused tools like Claude, Gemini, and TruffleHog. &lt;br&gt;
We dig into how GitHub Actions vulnerabilities were exploited, what makes postinstall scripts risky, and and what you can do to protect yourself from future attacks.&lt;/p&gt;

&lt;h3&gt;Links&lt;/h3&gt;

&lt;p&gt;Website: &lt;a href="https://feross.org" target="_blank" rel="nofollow noopener"&gt;https://feross.org&lt;/a&gt;&lt;br&gt;
X: &lt;a href="https://x.com/feross" target="_blank" rel="nofollow noopener"&gt;https://x.com/feross&lt;/a&gt;&lt;br&gt;
GitHub: &lt;a href="https://github.com/feross" target="_blank" rel="nofollow noopener"&gt;https://github.com/feross&lt;/a&gt;&lt;br&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/in/feross" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/feross&lt;/a&gt;&lt;br&gt;
YouTube: &lt;a href="https://www.youtube.com/channel/UCHM4OEvQDUq8UszyUrdov-w" target="_blank" rel="nofollow noopener"&gt;https://www.youtube.com/channel/UCHM4OEvQDUq8UszyUrdov-w&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Resources&lt;/h3&gt;

&lt;p&gt;npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack: &lt;a href="https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack" target="_blank" rel="nofollow noopener"&gt;https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack&lt;/a&gt;&lt;br&gt;
Compromised files replace npm packages with a combined 2 billion weekly downloads: &lt;a href="https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads" target="_blank" rel="nofollow noopener"&gt;https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads&lt;/a&gt;&lt;br&gt;
Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware: &lt;a href="https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack" target="_blank" rel="nofollow noopener"&gt;https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Chapters&lt;/h3&gt;

&lt;p&gt;00:00 Intro: NPM supply chain attacks explained&lt;br&gt;
01:10 What is a software supply chain attack?&lt;br&gt;
02:00 NPM phishing campaign: Fake login pages&lt;br&gt;
03:00 Prettier ecosystem compromised&lt;br&gt;
04:00 The “is” package malware incident&lt;br&gt;
05:30 NX package breach (August 27 attack)&lt;br&gt;
06:40 AI-powered supply chain exploit&lt;br&gt;
08:00 GitHub Actions misconfiguration&lt;br&gt;
12:00 Lessons from recent NPM attacks&lt;br&gt;
20:00 How malicious packages get published&lt;br&gt;
25:00 Why install scripts are so risky&lt;br&gt;
30:00 Limitations of banning install scripts&lt;br&gt;
35:00 Open source maintainer challenges&lt;br&gt;
40:00 Smarter approaches to dependency updates&lt;br&gt;
44:00 The future of open source supply chain security&lt;br&gt;
47:00 Closing thoughts and resources&lt;/p&gt;

&lt;h3&gt;We want to hear from you!&lt;/h3&gt;

&lt;p&gt;How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fill out our &lt;a href="https://t.co/oKVAEXipxu" target="_blank" rel="nofollow noopener"&gt;listener survey&lt;/a&gt;!&lt;/strong&gt; &lt;br&gt;
Let us know by sending an email to our producer, Elizabeth, at &lt;a href="mailto:elizabeth.becz@logrocket.com" target="_blank" rel="nofollow noopener"&gt;elizabet.becz@logrocket.com&lt;/a&gt;, or tweet at us at &lt;a href="https://twitter.com/PodRocketpod" target="_blank" rel="nofollow noopener"&gt;PodRocketPod&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;Follow us. Get free stickers.&lt;/h3&gt;

&lt;p&gt;Follow us on Apple Podcasts, fill out this &lt;a href="https://podrocket.logrocket.com/get-podrocket-stickers" target="_blank" rel="nofollow noopener"&gt;form&lt;/a&gt;, and we’ll send you free PodRocket stickers!&lt;/p&gt;

&lt;h3&gt;What does LogRocket do?&lt;/h3&gt;

&lt;p&gt;LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. &lt;a href="https://logrocket.com/signup/?pdr" target="_blank" rel="nofollow noopener"&gt;Try LogRocket for free today.&lt;/a&gt; Special Guest: Feross Aboukhadijeh.&lt;/p&gt;
</description>
  <itunes:keywords>NPM supply chain attacks, JavaScript ecosystem security, phishing npm credentials, prettier package hack, is package malware, nx build system attack, GitHub Actions vulnerability, Claude and Gemini exploited, trufflehog misuse, crypto wallet drainer, Levenshtein address spoofing, socket malware detection, install scripts NPM, postinstall malware, open source security, AI in security, typo squat packages, package worm propagation, secure software development, dependency vetting tools</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Feross Aboukhadijeh, founder of Socket, joins us to break down the recent wave of NPM supply chain attacks hitting the JavaScript ecosystem, including how attackers used phishing to target developers, snuck malware into popular packages like Prettier and &quot;is&quot;, and even abused tools like Claude, Gemini, and TruffleHog. <br>
We dig into how GitHub Actions vulnerabilities were exploited, what makes postinstall scripts risky, and and what you can do to protect yourself from future attacks.</p>

<h3>Links</h3>

<p>Website: <a href="https://feross.org" rel="nofollow">https://feross.org</a><br>
X: <a href="https://x.com/feross" rel="nofollow">https://x.com/feross</a><br>
GitHub: <a href="https://github.com/feross" rel="nofollow">https://github.com/feross</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/feross" rel="nofollow">https://www.linkedin.com/in/feross</a><br>
YouTube: <a href="https://www.youtube.com/channel/UCHM4OEvQDUq8UszyUrdov-w" rel="nofollow">https://www.youtube.com/channel/UCHM4OEvQDUq8UszyUrdov-w</a></p>

<h3>Resources</h3>

<p>npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack: <a href="https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack" rel="nofollow">https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack</a><br>
Compromised files replace npm packages with a combined 2 billion weekly downloads: <a href="https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads" rel="nofollow">https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads</a><br>
Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware: <a href="https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack" rel="nofollow">https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack</a></p>

<h3>Chapters</h3>

<p>00:00 Intro: NPM supply chain attacks explained<br>
01:10 What is a software supply chain attack?<br>
02:00 NPM phishing campaign: Fake login pages<br>
03:00 Prettier ecosystem compromised<br>
04:00 The “is” package malware incident<br>
05:30 NX package breach (August 27 attack)<br>
06:40 AI-powered supply chain exploit<br>
08:00 GitHub Actions misconfiguration<br>
12:00 Lessons from recent NPM attacks<br>
20:00 How malicious packages get published<br>
25:00 Why install scripts are so risky<br>
30:00 Limitations of banning install scripts<br>
35:00 Open source maintainer challenges<br>
40:00 Smarter approaches to dependency updates<br>
44:00 The future of open source supply chain security<br>
47:00 Closing thoughts and resources</p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <br>
Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabet.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Feross Aboukhadijeh.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Feross Aboukhadijeh, founder of Socket, joins us to break down the recent wave of NPM supply chain attacks hitting the JavaScript ecosystem, including how attackers used phishing to target developers, snuck malware into popular packages like Prettier and &quot;is&quot;, and even abused tools like Claude, Gemini, and TruffleHog. <br>
We dig into how GitHub Actions vulnerabilities were exploited, what makes postinstall scripts risky, and and what you can do to protect yourself from future attacks.</p>

<h3>Links</h3>

<p>Website: <a href="https://feross.org" rel="nofollow">https://feross.org</a><br>
X: <a href="https://x.com/feross" rel="nofollow">https://x.com/feross</a><br>
GitHub: <a href="https://github.com/feross" rel="nofollow">https://github.com/feross</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/feross" rel="nofollow">https://www.linkedin.com/in/feross</a><br>
YouTube: <a href="https://www.youtube.com/channel/UCHM4OEvQDUq8UszyUrdov-w" rel="nofollow">https://www.youtube.com/channel/UCHM4OEvQDUq8UszyUrdov-w</a></p>

<h3>Resources</h3>

<p>npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack: <a href="https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack" rel="nofollow">https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack</a><br>
Compromised files replace npm packages with a combined 2 billion weekly downloads: <a href="https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads" rel="nofollow">https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads</a><br>
Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware: <a href="https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack" rel="nofollow">https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack</a></p>

<h3>Chapters</h3>

<p>00:00 Intro: NPM supply chain attacks explained<br>
01:10 What is a software supply chain attack?<br>
02:00 NPM phishing campaign: Fake login pages<br>
03:00 Prettier ecosystem compromised<br>
04:00 The “is” package malware incident<br>
05:30 NX package breach (August 27 attack)<br>
06:40 AI-powered supply chain exploit<br>
08:00 GitHub Actions misconfiguration<br>
12:00 Lessons from recent NPM attacks<br>
20:00 How malicious packages get published<br>
25:00 Why install scripts are so risky<br>
30:00 Limitations of banning install scripts<br>
35:00 Open source maintainer challenges<br>
40:00 Smarter approaches to dependency updates<br>
44:00 The future of open source supply chain security<br>
47:00 Closing thoughts and resources</p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <br>
Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabet.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Feross Aboukhadijeh.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Secure by design with Vanessa Villa</title>
  <link>http://podrocket.logrocket.com/secure-by-design-vanessa-villa</link>
  <guid isPermaLink="false">4f1abcca-5d56-4fed-b471-a587b4eb9474</guid>
  <pubDate>Wed, 14 Feb 2024 08:00:00 -0500</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/4f1abcca-5d56-4fed-b471-a587b4eb9474.mp3" length="36305056" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>4</itunes:season>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>We welcome on Vanessa Villa, Developer Advocate at Pangea, to explain what the secure by design movement is about and how it shifts security to the beginning of the development cycle.</itunes:subtitle>
  <itunes:duration>30:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/4/4f1abcca-5d56-4fed-b471-a587b4eb9474/cover.jpg?v=1"/>
  <description>&lt;p&gt;We welcome on Vanessa Villa, Developer Advocate at Pangea, to explain what the secure by design movement is about and how it shifts security to the beginning of the development cycle.&lt;/p&gt;

&lt;h3&gt;Links&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.linkedin.com/in/vanessa-villa-tech" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/vanessa-villa-tech&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/vavillaiot" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/vavillaiot&lt;/a&gt;&lt;br&gt;
&lt;a href="https://pangea.cloud/blog/" target="_blank" rel="nofollow noopener"&gt;https://pangea.cloud/blog/&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;We want to hear from you!&lt;/h3&gt;

&lt;p&gt;How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?&lt;/p&gt;

&lt;p&gt;Let us know by sending an email to our producer, Emily, at &lt;a href="mailto:emily.kochanekketner@logrocket.com" target="_blank" rel="nofollow noopener"&gt;emily.kochanekketner@logrocket.com&lt;/a&gt;, or tweet at us at &lt;a href="https://twitter.com/PodRocketpod" target="_blank" rel="nofollow noopener"&gt;PodRocketPod&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;Follow us. Get free stickers.&lt;/h3&gt;

&lt;p&gt;Follow us on Apple Podcasts, fill out this &lt;a href="https://podrocket.logrocket.com/get-podrocket-stickers" target="_blank" rel="nofollow noopener"&gt;form&lt;/a&gt;, and we’ll send you free PodRocket stickers!&lt;/p&gt;

&lt;h3&gt;What does LogRocket do?&lt;/h3&gt;

&lt;p&gt;LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. &lt;a href="https://logrocket.com/signup/?pdr" target="_blank" rel="nofollow noopener"&gt;Try LogRocket for free today.&lt;/a&gt; Special Guest: Vanessa Villa.&lt;/p&gt;
</description>
  <itunes:keywords>Security, web security, secure by design, dev security</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We welcome on Vanessa Villa, Developer Advocate at Pangea, to explain what the secure by design movement is about and how it shifts security to the beginning of the development cycle.</p>

<h3>Links</h3>

<p><a href="https://www.linkedin.com/in/vanessa-villa-tech" rel="nofollow">https://www.linkedin.com/in/vanessa-villa-tech</a><br>
<a href="https://twitter.com/vavillaiot" rel="nofollow">https://twitter.com/vavillaiot</a><br>
<a href="https://pangea.cloud/blog/" rel="nofollow">https://pangea.cloud/blog/</a></p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p>Let us know by sending an email to our producer, Emily, at <a href="mailto:emily.kochanekketner@logrocket.com" rel="nofollow">emily.kochanekketner@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Vanessa Villa.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We welcome on Vanessa Villa, Developer Advocate at Pangea, to explain what the secure by design movement is about and how it shifts security to the beginning of the development cycle.</p>

<h3>Links</h3>

<p><a href="https://www.linkedin.com/in/vanessa-villa-tech" rel="nofollow">https://www.linkedin.com/in/vanessa-villa-tech</a><br>
<a href="https://twitter.com/vavillaiot" rel="nofollow">https://twitter.com/vavillaiot</a><br>
<a href="https://pangea.cloud/blog/" rel="nofollow">https://pangea.cloud/blog/</a></p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p>Let us know by sending an email to our producer, Emily, at <a href="mailto:emily.kochanekketner@logrocket.com" rel="nofollow">emily.kochanekketner@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Vanessa Villa.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Security and path traversal with Liran Tal</title>
  <link>http://podrocket.logrocket.com/security-and-path-traversal</link>
  <guid isPermaLink="false">ffb2cabe-446a-4695-87a5-fc75f62f2ebd</guid>
  <pubDate>Tue, 23 May 2023 08:00:00 -0400</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/ffb2cabe-446a-4695-87a5-fc75f62f2ebd.mp3" length="28560256" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>3</itunes:season>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>Today, we have Liran Tal, Director of Developer Advocacy at Snyk, to talk about a security risk all developers should know about: path traversal.</itunes:subtitle>
  <itunes:duration>23:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/f/ffb2cabe-446a-4695-87a5-fc75f62f2ebd/cover.jpg?v=1"/>
  <description>&lt;p&gt;Today, we have Liran Tal, Director of Developer Advocacy at Snyk, to talk about a security risk all developers should know about: path traversal.&lt;/p&gt;

&lt;h3&gt;Links&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://twitter.com/liran_tal" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/liran_tal&lt;/a&gt;&lt;br&gt;
&lt;a href="https://lirantal.com/" target="_blank" rel="nofollow noopener"&gt;https://lirantal.com/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://github.com/lirantal" target="_blank" rel="nofollow noopener"&gt;https://github.com/lirantal&lt;/a&gt;&lt;br&gt;
&lt;a href="https://lirantal.com/blog" target="_blank" rel="nofollow noopener"&gt;https://lirantal.com/blog&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.linkedin.com/in/talliran" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/talliran&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Tell us what you think of PodRocket&lt;/h3&gt;

&lt;p&gt;We want to hear from you! We want to know what you love and hate about the podcast. What do you want to hear more about? Who do you want to see on the show? Our producers want to know, and if you talk with us, we’ll send you a $25 gift card!&lt;/p&gt;

&lt;p&gt;If you’re interested, &lt;a href="https://podrocket.logrocket.com/contact-us" target="_blank" rel="nofollow noopener"&gt;schedule a call with us&lt;/a&gt; or you can email producer Kate Trahan at &lt;a href="mailto:kate@logrocket.com" target="_blank" rel="nofollow noopener"&gt;kate@logrocket.com&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Follow us. Get free stickers.&lt;/h3&gt;

&lt;p&gt;Follow us on Apple Podcasts, fill out this &lt;a href="https://podrocket.logrocket.com/get-podrocket-stickers" target="_blank" rel="nofollow noopener"&gt;form&lt;/a&gt;, and we’ll send you free PodRocket stickers!&lt;/p&gt;

&lt;h3&gt;What does LogRocket do?&lt;/h3&gt;

&lt;p&gt;LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. &lt;a href="https://logrocket.com/signup/?pdr" target="_blank" rel="nofollow noopener"&gt;Try LogRocket for free today.&lt;/a&gt; Special Guest: Liran Tal.&lt;/p&gt;
</description>
  <itunes:keywords>security, path traversal</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Today, we have Liran Tal, Director of Developer Advocacy at Snyk, to talk about a security risk all developers should know about: path traversal.</p>

<h3>Links</h3>

<p><a href="https://twitter.com/liran_tal" rel="nofollow">https://twitter.com/liran_tal</a><br>
<a href="https://lirantal.com/" rel="nofollow">https://lirantal.com/</a><br>
<a href="https://github.com/lirantal" rel="nofollow">https://github.com/lirantal</a><br>
<a href="https://lirantal.com/blog" rel="nofollow">https://lirantal.com/blog</a><br>
<a href="https://www.linkedin.com/in/talliran" rel="nofollow">https://www.linkedin.com/in/talliran</a></p>

<h3>Tell us what you think of PodRocket</h3>

<p>We want to hear from you! We want to know what you love and hate about the podcast. What do you want to hear more about? Who do you want to see on the show? Our producers want to know, and if you talk with us, we’ll send you a $25 gift card!</p>

<p>If you’re interested, <a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">schedule a call with us</a> or you can email producer Kate Trahan at <a href="mailto:kate@logrocket.com" rel="nofollow">kate@logrocket.com</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Liran Tal.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Today, we have Liran Tal, Director of Developer Advocacy at Snyk, to talk about a security risk all developers should know about: path traversal.</p>

<h3>Links</h3>

<p><a href="https://twitter.com/liran_tal" rel="nofollow">https://twitter.com/liran_tal</a><br>
<a href="https://lirantal.com/" rel="nofollow">https://lirantal.com/</a><br>
<a href="https://github.com/lirantal" rel="nofollow">https://github.com/lirantal</a><br>
<a href="https://lirantal.com/blog" rel="nofollow">https://lirantal.com/blog</a><br>
<a href="https://www.linkedin.com/in/talliran" rel="nofollow">https://www.linkedin.com/in/talliran</a></p>

<h3>Tell us what you think of PodRocket</h3>

<p>We want to hear from you! We want to know what you love and hate about the podcast. What do you want to hear more about? Who do you want to see on the show? Our producers want to know, and if you talk with us, we’ll send you a $25 gift card!</p>

<p>If you’re interested, <a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">schedule a call with us</a> or you can email producer Kate Trahan at <a href="mailto:kate@logrocket.com" rel="nofollow">kate@logrocket.com</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Liran Tal.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Azure security with Sarah Young</title>
  <link>http://podrocket.logrocket.com/azure-security</link>
  <guid isPermaLink="false">ee272d76-65eb-4c70-a970-d0675dc9fa0d</guid>
  <pubDate>Fri, 28 Oct 2022 08:00:00 -0400</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/ee272d76-65eb-4c70-a970-d0675dc9fa0d.mp3" length="45303778" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>2</itunes:season>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>Sarah Young is a Senior Cloud Security Advocate at Microsoft. Sarah joins us today to talk about Azure security, Zero Trust principles, and important investments in the security ecosystem.</itunes:subtitle>
  <itunes:duration>36:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/e/ee272d76-65eb-4c70-a970-d0675dc9fa0d/cover.jpg?v=1"/>
  <description>&lt;p&gt;Sarah Young is a Senior Cloud Security Advocate at Microsoft. Sarah joins us today to talk about Azure security, Zero Trust principles, and important investments in the security ecosystem.&lt;/p&gt;

&lt;h3&gt;Links&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://twitter.com/_sarahyo" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/_sarahyo&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.sarahyoung.io" target="_blank" rel="nofollow noopener"&gt;https://www.sarahyoung.io&lt;/a&gt;&lt;br&gt;
&lt;a href="https://ignite.microsoft.com" target="_blank" rel="nofollow noopener"&gt;https://ignite.microsoft.com&lt;/a&gt;&lt;br&gt;
&lt;a href="https://azure.microsoft.com" target="_blank" rel="nofollow noopener"&gt;https://azure.microsoft.com&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Tell us what you think of PodRocket&lt;/h3&gt;

&lt;p&gt;We want to hear from you! We want to know what you love and hate about the podcast. What do you want to hear more about? Who do you want to see on the show? Our producers want to know, and if you talk with us, we’ll send you a $25 gift card!&lt;/p&gt;

&lt;p&gt;If you’re interested, &lt;a href="https://podrocket.logrocket.com/contact-us" target="_blank" rel="nofollow noopener"&gt;schedule a call with us&lt;/a&gt; or you can email producer Kate Trahan at &lt;a href="mailto:kate@logrocket.com" target="_blank" rel="nofollow noopener"&gt;kate@logrocket.com&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Follow us. Get free stickers.&lt;/h3&gt;

&lt;p&gt;Follow us on Apple Podcasts, fill out this &lt;a href="https://podrocket.logrocket.com/get-podrocket-stickers" target="_blank" rel="nofollow noopener"&gt;form&lt;/a&gt;, and we’ll send you free PodRocket stickers!&lt;/p&gt;

&lt;h3&gt;What does LogRocket do?&lt;/h3&gt;

&lt;p&gt;LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. &lt;a href="https://logrocket.com/signup/?pdr" target="_blank" rel="nofollow noopener"&gt;Try LogRocket for free today.&lt;/a&gt; Special Guest: Sarah Young.&lt;/p&gt;
</description>
  <itunes:keywords>Azure, Microsoft, Cloud Security, Security, Zero Trust</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Sarah Young is a Senior Cloud Security Advocate at Microsoft. Sarah joins us today to talk about Azure security, Zero Trust principles, and important investments in the security ecosystem.</p>

<h3>Links</h3>

<p><a href="https://twitter.com/_sarahyo" rel="nofollow">https://twitter.com/_sarahyo</a><br>
<a href="https://www.sarahyoung.io" rel="nofollow">https://www.sarahyoung.io</a><br>
<a href="https://ignite.microsoft.com" rel="nofollow">https://ignite.microsoft.com</a><br>
<a href="https://azure.microsoft.com" rel="nofollow">https://azure.microsoft.com</a></p>

<h3>Tell us what you think of PodRocket</h3>

<p>We want to hear from you! We want to know what you love and hate about the podcast. What do you want to hear more about? Who do you want to see on the show? Our producers want to know, and if you talk with us, we’ll send you a $25 gift card!</p>

<p>If you’re interested, <a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">schedule a call with us</a> or you can email producer Kate Trahan at <a href="mailto:kate@logrocket.com" rel="nofollow">kate@logrocket.com</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Sarah Young.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Sarah Young is a Senior Cloud Security Advocate at Microsoft. Sarah joins us today to talk about Azure security, Zero Trust principles, and important investments in the security ecosystem.</p>

<h3>Links</h3>

<p><a href="https://twitter.com/_sarahyo" rel="nofollow">https://twitter.com/_sarahyo</a><br>
<a href="https://www.sarahyoung.io" rel="nofollow">https://www.sarahyoung.io</a><br>
<a href="https://ignite.microsoft.com" rel="nofollow">https://ignite.microsoft.com</a><br>
<a href="https://azure.microsoft.com" rel="nofollow">https://azure.microsoft.com</a></p>

<h3>Tell us what you think of PodRocket</h3>

<p>We want to hear from you! We want to know what you love and hate about the podcast. What do you want to hear more about? Who do you want to see on the show? Our producers want to know, and if you talk with us, we’ll send you a $25 gift card!</p>

<p>If you’re interested, <a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">schedule a call with us</a> or you can email producer Kate Trahan at <a href="mailto:kate@logrocket.com" rel="nofollow">kate@logrocket.com</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Sarah Young.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>1Password with Andrew Beyer</title>
  <link>http://podrocket.logrocket.com/1password</link>
  <guid isPermaLink="false">b32672cd-8ba9-4f13-8c0f-e9fbb508e64d</guid>
  <pubDate>Wed, 20 Apr 2022 08:00:00 -0400</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/b32672cd-8ba9-4f13-8c0f-e9fbb508e64d.mp3" length="78679068" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>2</itunes:season>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>In this episode, we talk to Andrew Beyer, senior engineering manager at 1Password, about how 1Password helps people generate and store unique passwords, how 1Password's engineering org has evolved, and the future of passwords.</itunes:subtitle>
  <itunes:duration>40:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/b/b32672cd-8ba9-4f13-8c0f-e9fbb508e64d/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode, we talk to Andrew Beyer, senior engineering manager at 1Password, about how 1Password helps people generate and store unique passwords, how 1Password's engineering org has evolved, and the future of passwords.&lt;/p&gt;

&lt;h3&gt;Links&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://1password.com/" target="_blank" rel="nofollow noopener"&gt;https://1password.com/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/firebeyer" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/firebeyer&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.w3.org/community/webextensions/" target="_blank" rel="nofollow noopener"&gt;https://www.w3.org/community/webextensions/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.future.1password.com/" target="_blank" rel="nofollow noopener"&gt;https://www.future.1password.com/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://1password.com/jobs/" target="_blank" rel="nofollow noopener"&gt;https://1password.com/jobs/&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Review us&lt;/h3&gt;

&lt;p&gt;Reviews are what help us grow and tailor our content to what you want to hear. Give us a review &lt;a href="https://ratethispodcast.com/podrocket" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;Contact us&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://podrocket.logrocket.com/contact-us" target="_blank" rel="nofollow noopener"&gt;https://podrocket.logrocket.com/contact-us&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/PodRocketpod" target="_blank" rel="nofollow noopener"&gt;@PodRocketpod&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;What does LogRocket do?&lt;/h3&gt;

&lt;p&gt;LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. &lt;a href="https://logrocket.com/signup/?pdr" target="_blank" rel="nofollow noopener"&gt;Try LogRocket for free today.&lt;/a&gt; Special Guest: Andrew Beyer.&lt;/p&gt;
</description>
  <itunes:keywords>security, web development, 1password, frontend</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode, we talk to Andrew Beyer, senior engineering manager at 1Password, about how 1Password helps people generate and store unique passwords, how 1Password&#39;s engineering org has evolved, and the future of passwords.</p>

<h3>Links</h3>

<p><a href="https://1password.com/" rel="nofollow">https://1password.com/</a><br>
<a href="https://twitter.com/firebeyer" rel="nofollow">https://twitter.com/firebeyer</a><br>
<a href="https://www.w3.org/community/webextensions/" rel="nofollow">https://www.w3.org/community/webextensions/</a><br>
<a href="https://www.future.1password.com/" rel="nofollow">https://www.future.1password.com/</a><br>
<a href="https://1password.com/jobs/" rel="nofollow">https://1password.com/jobs/</a></p>

<h3>Review us</h3>

<p>Reviews are what help us grow and tailor our content to what you want to hear. Give us a review <a href="https://ratethispodcast.com/podrocket" rel="nofollow">here</a>.</p>

<h3>Contact us</h3>

<p><a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">https://podrocket.logrocket.com/contact-us</a><br>
<a href="https://twitter.com/PodRocketpod" rel="nofollow">@PodRocketpod</a></p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Andrew Beyer.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode, we talk to Andrew Beyer, senior engineering manager at 1Password, about how 1Password helps people generate and store unique passwords, how 1Password&#39;s engineering org has evolved, and the future of passwords.</p>

<h3>Links</h3>

<p><a href="https://1password.com/" rel="nofollow">https://1password.com/</a><br>
<a href="https://twitter.com/firebeyer" rel="nofollow">https://twitter.com/firebeyer</a><br>
<a href="https://www.w3.org/community/webextensions/" rel="nofollow">https://www.w3.org/community/webextensions/</a><br>
<a href="https://www.future.1password.com/" rel="nofollow">https://www.future.1password.com/</a><br>
<a href="https://1password.com/jobs/" rel="nofollow">https://1password.com/jobs/</a></p>

<h3>Review us</h3>

<p>Reviews are what help us grow and tailor our content to what you want to hear. Give us a review <a href="https://ratethispodcast.com/podrocket" rel="nofollow">here</a>.</p>

<h3>Contact us</h3>

<p><a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">https://podrocket.logrocket.com/contact-us</a><br>
<a href="https://twitter.com/PodRocketpod" rel="nofollow">@PodRocketpod</a></p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Andrew Beyer.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Open-source supply chain security with Feross Aboukhadijeh</title>
  <link>http://podrocket.logrocket.com/socket</link>
  <guid isPermaLink="false">ea6c356b-f4fb-4e9f-a286-14f603f5b706</guid>
  <pubDate>Tue, 22 Mar 2022 08:00:00 -0400</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/ea6c356b-f4fb-4e9f-a286-14f603f5b706.mp3" length="86853029" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>2</itunes:season>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>Feross Aboukhadijeh is the creator of WebTorrent, StandardJS, and Wormhole. We talked to Feross about Wormhole back in June and he joins us now to talk about Socket.dev, a new security company that can protect your most critical apps from supply chain attacks. </itunes:subtitle>
  <itunes:duration>44:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/e/ea6c356b-f4fb-4e9f-a286-14f603f5b706/cover.jpg?v=1"/>
  <description>&lt;p&gt;Feross Aboukhadijeh is the creator of WebTorrent, StandardJS, and Wormhole. We talked to Feross about Wormhole back in June and he joins us now to talk about Socket.dev, a new security company that can protect your most critical apps from supply chain attacks. &lt;/p&gt;

&lt;h3&gt;Links&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://twitter.com/feross" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/feross&lt;/a&gt;&lt;br&gt;
&lt;a href="https://socket.dev" target="_blank" rel="nofollow noopener"&gt;https://socket.dev&lt;/a&gt;&lt;br&gt;
&lt;a href="https://socket.dev/npm/category/removed" target="_blank" rel="nofollow noopener"&gt;https://socket.dev/npm/category/removed&lt;/a&gt;&lt;br&gt;
&lt;a href="https://socketdev.notion.site/Join-the-Socket-Team" target="_blank" rel="nofollow noopener"&gt;https://socketdev.notion.site/Join-the-Socket-Team&lt;/a&gt;&lt;br&gt;
&lt;a href="https://webtorrent.io" target="_blank" rel="nofollow noopener"&gt;https://webtorrent.io&lt;/a&gt;&lt;br&gt;
&lt;a href="https://standardjs.com" target="_blank" rel="nofollow noopener"&gt;https://standardjs.com&lt;/a&gt;&lt;br&gt;
&lt;a href="https://wormhole.app" target="_blank" rel="nofollow noopener"&gt;https://wormhole.app&lt;/a&gt;&lt;br&gt;
&lt;a href="https://podrocket.logrocket.com/wormhole" target="_blank" rel="nofollow noopener"&gt;https://podrocket.logrocket.com/wormhole&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Review us&lt;/h3&gt;

&lt;p&gt;Reviews are what help us grow and tailor our content to what you want to hear. Give us a review &lt;a href="https://ratethispodcast.com/podrocket" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;Contact us&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://podrocket.logrocket.com/contact-us" target="_blank" rel="nofollow noopener"&gt;https://podrocket.logrocket.com/contact-us&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/PodRocketpod" target="_blank" rel="nofollow noopener"&gt;@PodRocketpod&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;What does LogRocket do?&lt;/h3&gt;

&lt;p&gt;LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. &lt;a href="https://logrocket.com/signup/?pdr" target="_blank" rel="nofollow noopener"&gt;Try LogRocket for free today.&lt;/a&gt;&lt;br&gt;
 Special Guest: Feross Aboukhadijeh.&lt;/p&gt;
</description>
  <itunes:keywords>security, open source, web development, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Feross Aboukhadijeh is the creator of WebTorrent, StandardJS, and Wormhole. We talked to Feross about Wormhole back in June and he joins us now to talk about Socket.dev, a new security company that can protect your most critical apps from supply chain attacks. </p>

<h3>Links</h3>

<p><a href="https://twitter.com/feross" rel="nofollow">https://twitter.com/feross</a><br>
<a href="https://socket.dev" rel="nofollow">https://socket.dev</a><br>
<a href="https://socket.dev/npm/category/removed" rel="nofollow">https://socket.dev/npm/category/removed</a><br>
<a href="https://socketdev.notion.site/Join-the-Socket-Team" rel="nofollow">https://socketdev.notion.site/Join-the-Socket-Team</a><br>
<a href="https://webtorrent.io" rel="nofollow">https://webtorrent.io</a><br>
<a href="https://standardjs.com" rel="nofollow">https://standardjs.com</a><br>
<a href="https://wormhole.app" rel="nofollow">https://wormhole.app</a><br>
<a href="https://podrocket.logrocket.com/wormhole" rel="nofollow">https://podrocket.logrocket.com/wormhole</a></p>

<h3>Review us</h3>

<p>Reviews are what help us grow and tailor our content to what you want to hear. Give us a review <a href="https://ratethispodcast.com/podrocket" rel="nofollow">here</a>.</p>

<h3>Contact us</h3>

<p><a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">https://podrocket.logrocket.com/contact-us</a><br>
<a href="https://twitter.com/PodRocketpod" rel="nofollow">@PodRocketpod</a></p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Feross Aboukhadijeh.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Feross Aboukhadijeh is the creator of WebTorrent, StandardJS, and Wormhole. We talked to Feross about Wormhole back in June and he joins us now to talk about Socket.dev, a new security company that can protect your most critical apps from supply chain attacks. </p>

<h3>Links</h3>

<p><a href="https://twitter.com/feross" rel="nofollow">https://twitter.com/feross</a><br>
<a href="https://socket.dev" rel="nofollow">https://socket.dev</a><br>
<a href="https://socket.dev/npm/category/removed" rel="nofollow">https://socket.dev/npm/category/removed</a><br>
<a href="https://socketdev.notion.site/Join-the-Socket-Team" rel="nofollow">https://socketdev.notion.site/Join-the-Socket-Team</a><br>
<a href="https://webtorrent.io" rel="nofollow">https://webtorrent.io</a><br>
<a href="https://standardjs.com" rel="nofollow">https://standardjs.com</a><br>
<a href="https://wormhole.app" rel="nofollow">https://wormhole.app</a><br>
<a href="https://podrocket.logrocket.com/wormhole" rel="nofollow">https://podrocket.logrocket.com/wormhole</a></p>

<h3>Review us</h3>

<p>Reviews are what help us grow and tailor our content to what you want to hear. Give us a review <a href="https://ratethispodcast.com/podrocket" rel="nofollow">here</a>.</p>

<h3>Contact us</h3>

<p><a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">https://podrocket.logrocket.com/contact-us</a><br>
<a href="https://twitter.com/PodRocketpod" rel="nofollow">@PodRocketpod</a></p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Feross Aboukhadijeh.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
