insecure-deserialization
Python Deserialization Attacks Explained: How Hackers Exploit Pickle (and How to Defend)
Learn how Python deserialization attacks work, see a real Pickle exploit in action, and discover best practices to secure your code against remote code execution vulnerabilities.
dagster
Data Engineering With Dagster – Part Four: Resources, DRY Pipelines, and ETL in Practice
A deeper look at how Dagster handles reusable components like API clients and cloud connectors through resources - with best practices and cookie metaphors baked in.
dagster
Data Engineering With Dagster - Part Two: Dependencies, DuckDB, and Geo Heatmaps
Learning to wire assets together, load data into DuckDB, and build heatmaps with real NYC taxi data.
dagster
Data Engineering With Dagster - Part One: A Fresh Take on Orchestration
A student-hacker’s perspective on learning data engineering with Dagster: asset-centric thinking, orchestrator basics, and setting up the mental model.