> ...which looks a lot like someone trying to hack information from the
> PyPI server, so thought I'd let you know...

People are encouraged to review the code, but I'm fairly sure that these
attempts are futile. ISTM that this is a generic attack to try to fill
out parameters that remotely look like file names with what the attacker
thinks might also be valid filenames.

You can find the :action processing in inner_run of

https://svn.python.org/packages/trunk/pypi/webui.py

Regards,
Martin
_______________________________________________
Catalog-SIG mailing list
[email protected]
http://mail.python.org/mailman/listinfo/catalog-sig

Reply via email to