What if a supply chain attack didn’t start with a sophisticated exploit… but with something totally normal?
A typo.
A copy-paste.
An AI suggestion.
In this episode, Tanya Janca walks through how modern supply chain attacks actually happen, and why they’re less about “elite hackers” and more about everyday developer workflows.
You’ll learn why these attacks are not a single event, but a sequence of small, reasonable decisions that quietly introduce risk into our systems.
What You’ll Learn
- Â Why supply chain attacks are a process, not a moment
- Â How attackers exploit normal developer behaviour
- Â A realistic, step-by-step walk through of a modern attackÂ
- Â Why traditional SCA approaches often failÂ
- Â How to focus on real risk instead of noise
A Realistic Attack, Step by Step
This episode walks through a common pattern seen in real-world incidents:
- Â An attacker identifies a package name used internallyÂ
- Â They publish a lookalike or typo-squatted packageÂ
- Â Malicious behaviour is hidden in install scripts or dependenciesÂ
- Â A developer installs it, often unintentionallyÂ
-  The system continues working… but access is now compromisedÂ
Bad / Better / Best: Managing Supply Chain Risk
Bad: Ignore supply chain risk or abandon tools due to noise
Better: Use SCA, but without context or prioritization
Best: Use SCA with reachability or runtime analysis
If You Do Just One Thing This Week
Run an SCA tool with reachability enabled, and take action on one issue.
- Â Run SCA on your current projectÂ
- Â Filter to: high severity + reachable
- Â Fix one issue (remove, upgrade, or replace)Â
- Â Add one guardrail:Â
- Â Pin versions and use lockfilesÂ
- Â Restrict registriesÂ
- Â Fail CI on high + reachable findingsÂ
You don’t need to fix everything. But you do need to start.
Â
🚉 About DevSec Station
DevSec Station is a security-focused podcast for developers.
Please like and subscribe. Hosted by Tanya Janca | SheHacksPurple