1. Chess, B., Lee, F.D.Q., West, J.: Attacking the build through cross-build injection: how your build process can open the gates to a trojan horse.
https://www.fortify.com/downloads2/public/fortify_attacking_the_build.pdf
(2007). Accessed 06 Mar 2019
2. Baker, G.: Keep your dependencies secure and up-to-date with GitHub and Dependabot (2019).
https://github.blog/2019-01-31-keep-your-dependencies-secure-and-up-to-date-with-github-and-dependabot/
. Accessed 08 Oct 2019
3. Bertus: Cryptocurrency clipboard hijacker discovered in PyPi repository (2018).
https://medium.com/@bertusk/cryptocurrency-clipboard-hijacker-discovered-in-pypi-repository-b66b8a534a8
. Accessed 09 Mar 2019
4. Bertus: Discord token stealer discovered in PyPi repository (2019).
https://medium.com/@bertusk/discord-token-stealer-discovered-in-pypi-repository-e65ed9c3de06
. Accessed 02 July 2019
5. Bintray: Malicious packages reported in JCenter (2017).
https://status.bintray.com/incidents/w4dfr0rpznkt
. Accessed 14 Mar 2019