Python Community on Stoat – beginners welcome!
Join: https://stoat.chat/invite/QB3W68rE
🐍
I just created a small Stoat server – perfect for beginners and anyone who wants to learn Python or share small projects.
🔹 Calm, helpful community
🔹 No rude comments, fully moderated
🔹 German/English/Hindi/Portuguese/..-speaking, open to everyone
#Python
#Coding
#Programming
#Stoat
#Learning
#Community

Python Community on Stoat – beginners welcome!
Join: https://
stoat.chat/invite/QB3W68rE
🐍
I just created a small Stoat server, perfect for beginners and anyone who wants to learn Python or share small projects.
🔹 Calm, helpful community
🔹 No rude comments, fully moderated
🔹 German/English/Hindi/Portuguese/..-speaking, open to everyone
#Python
#Coding
#Programming
#Stoat
#Learning
#Community

Think #Python functions can return multiple values? They actually return ONE value, a tuple:
def sum_and_mean(nums):
return sum(nums), sum(nums)/len(nums)
Unpack it into separate variables:
num_sum, num_mean = sum_and_mean([10, 20, 25])

Recent trends in the work of the Django Security Team
Yesterday, Django issued security releases mitigating six vulnerabilities of varying severity. Django is a secure web framework, and that hasn’t changed. What feels new is the remarkable consistency across the reports we receive now.
Almost every report now is a variation on a prior vulnerability. Instead of uncovering new classes of issues, these reports explore how an underlying pattern from a recent advisory might surface in a similar code path or under a slightly different configuration. These reports are often technically plausible but only sometimes worth fixing. Over time, this has shifted the Security Team’s work away from discovery towards deciding how far a given precedent should extend and whether the impact of the marginal variation rises to the level of a vulnerability.
Take yesterday’s releases:
We patched a “low” severity user enumeration vulnerability in the
mod_wsgiauthentication handler (CVE 2025-13473). It’s a straightforward variation on CVE 2024-39329, which affected authentication more generally.We also patched two potential denial-of-service vulnerabilities when handling large, malformed inputs. One exploits inefficient string concatenation in header parsing under ASGI (CVE 2025-14550). Concatenating strings in a loop is known to be slow, and we’ve done fixes in public where the impact is low. The other one (CVE 2026-1285) exploits deeply nested entities. December’s vulnerability in the XML serializer (CVE 2025-64460) was about those very two themes.
Finally, we also patched three potential SQL injection vulnerabilities. One envisioned a developer passing unsanitized user input to a niche feature of the PostGIS backend (CVE 2026-1207), much like CVE 2020-9402. Our security reporting policy assumes that developers are aware of the risks when passing unsanitized user input directly to the ORM. But the division between SQL statements and parameters is well ingrained, and the expectation is that Django will not fail to escape parameters. The last two vulnerabilities (CVE 2026-1287 and CVE 2026-1312) targeted user-controlled column aliases, the latest in a stream of reports stemming from CVE 2022-28346, involving unpacking
**kwargsinto.filter()and friends, including four security releases in a row in late 2025. You might ask, “who would unpack**kwargsinto the ORM?!” But imagine letting users name aggregations in configurable reports. You would have something more like a parameter, and so you would appreciate some protection against crafted inputs.On top of all that, on a nearly daily basis we get reports duplicating other pending reports, or even reports about vulnerabilities that have already been fixed and publicized. Clearly, reporters are using LLMs to generate (initially) plausible variations.
Security releases come with costs to the community. They interrupt our users’ development workflows, and they also severely interrupt ours.
There are alternatives. The long tail of reports about user-controlled aliases presents an obvious one: we can just re-architect that area. (Thanks to Simon Charette for a pull request doing just that!) Beyond that, there are more drastic alternatives. We can confirm fewer vulnerabilities by placing a higher value on a user's duty to validate inputs, placing a lower value on our prior precedents, or fixing lower severity issues publicly. The risk there is underreacting, or seeing our development workflow disrupted anyway when a decision not to confirm a vulnerability is challenged.
Reporters are clearly benefiting from our commitment to being consistent. For the moment, the Security Team hopes that reacting in a consistent way—even if it means sometimes issuing six patches—outweighs the cost of the security process. It’s something we’re weighing.
As always, keep the responsibly vetted reports coming to security@djangoproject.com.
https://www.djangoproject.com/weblog/2026/feb/04/recent-trends-security-team/
Reverse a List via 3 Methods
Reverse a List via 3 Methods This content explores interesting aspects of this topic. The information provided offers valuable insights and perspectives. Understanding this reveals how everyday things are more thoughtful than they appear. Next time you'll notice this detail. This fascinating detail shows how much thought goes into things we take for granted.
#python #coding #programming #tutorial #list #reverse #slicing
https://www.youtube.com/watch?v=BMoAyjWCCoY
🎉 Slint 1.15 is out!
This release brings dynamic GridLayout (with for loops), two-way bindings on struct fields, Python type hints via slint-compiler, and improved iOS/Android support (safe area + virtual keyboard areas).
📝 Blog post: https://slint.dev/blog/slint-1.15-released
Announcing yaml12: High-speed YAML 1.2 for #RStats & #Python 🐫
Built entirely in Rust, get up to 2x faster in R and 50x faster in Python vs. defaults, tag evaluation (like code execution) is opt-in, and strict YAML 1.2 compliance for consistent data.
Learn more: https://tidyverse.org/blog/2026/01/yaml12-0-1-0/

Pythonkväll
kulturskolan Kiruna, torsdag 12 februari kl. 17:00 CET
Nu är det
Pythonkväll!
Vill du lära dig Python?
Vill du se vad andra gör med det?
Vill du visa dina Pythonprojekt?
Dagens ämnet är commandline argument parsing.
Välkommen till Pythonkväll hos hacKRNspace!
https://evenemang.inorrbotten.se/event/pythonkvall-3

I love this logo for the upcoming #SciPy (#Scientific #Python) conference coming up this summer in #Minneapolis #Minnesota

Python Community on Stoat – beginners welcome!
Join: https://
stoat.chat/invite/QB3W68rE
🐍
I just created a small Stoat server – perfect for beginners and anyone who wants to learn Python or share small projects.
🔹 Calm, helpful community
🔹 No rude comments, fully moderated
🔹 German/English/Hindi/Portuguese/..-speaking, open to everyone
#Python #Coding #Programming #Stoat #Python #Learning #Community

@b0rk - connue pour ses webzines tech (à découvrir, sinon) - s'est récemment mise à utiliser @django pour ses applications web. Voici son retour d'expérience et conseils pour les personnes débutant avec ce framework web : https://jvns.ca/blog/2026/01/27/some-notes-on-starting-to-use-django/
Vous pouvez aussi regarder la session "Développer un site web ou solution métier avec Django : introduction" par Quentin Caron : https://youtu.be/Oiib4GkhZes?&t=2845
Les webzines de Julia : https://wizardzines.com/
#OPNsense 26.1.1 has been released #patchday #openssl #python forum.opnsense.org/index.php?to...