Python Security Response Team: New Governance, New Member, and How You Can Contribute

By

A New Era for Python Security

The Python Security Response Team (PSRT) has long been the backbone of vulnerability management for the Python ecosystem. Until recently, its operations were largely informal, relying on the dedication of volunteers and staff. That changes now with the approval of PEP 811, a public governance document that formalizes the PSRT’s structure, membership, and processes. In a welcome sign of momentum, the PSF’s Infrastructure Engineer, Jacob Coffee, has also just become the first non-Release Manager to join the team since Seth Larson’s arrival in 2023.

Python Security Response Team: New Governance, New Member, and How You Can Contribute

PSRT Gets a Formal Governance Document (PEP 811)

Thanks to the work of Seth Larson, the Security Developer-in-Residence at the Python Software Foundation, PEP 811 is now officially adopted. This document brings several key improvements:

This governance overhaul is already proving its worth, as it has enabled a smooth addition of a new member without compromising security practices.

First New Member Under Revised Process: Jacob Coffee

Jacob Coffee, the PSF Infrastructure Engineer, has joined the PSRT as the first non-"Release Manager" member since Seth himself joined in 2023. His expertise in infrastructure will be invaluable for handling vulnerabilities that affect packaging, distribution, and runtime environments. Expect more new members in the coming months, further strengthening the team’s ability to handle security work sustainably.

What the Python Security Response Team Does

Security doesn’t happen by accident. The PSRT triages incoming vulnerability reports, coordinates remediation with developers, and publishes advisories to keep all Python users safe. Last year alone, the team published 16 vulnerability advisories for CPython and pip—the highest annual count to date.

Importantly, the PSRT rarely works in isolation. Coordinators are encouraged to involve project maintainers and subject-matter experts directly in the fix process. This ensures that patches adhere to existing API conventions, align with threat models, remain maintainable long-term, and minimize disruption to real-world use cases.

Sometimes the team goes even further, coordinating with other open source projects to avoid leaving the broader ecosystem off guard. A recent example is the mitigation for PyPI’s ZIP archive differential attack, which required alignment with multiple package registries.

Recognizing Security Contributions

Security work—often done in private—deserves as much recognition as code contributions. Seth and Jacob are now developing better workflows using GitHub Security Advisories to record the reporter, coordinator, and remediation developers and reviewers all the way through to CVE and OSV records. This means everyone involved in a fix will be properly thanked, even if the vulnerability details remain confidential for a period.

How to Join the Python Security Response Team

If you’re inspired to help keep Python secure, know that the process is similar to the Core Team nomination process. You need an existing PSRT member to nominate you, and your nomination must receive at least two-thirds positive votes from current members. You do not need to be a core developer, triager, or have any special title—the PSRT values diverse expertise, including infrastructure, cryptography, web security, and more.

The PSRT is supported by the Python Software Foundation and by organizations like Alpha-Omega, which sponsors Seth’s work as the Security Developer-in-Residence. Their backing ensures that Python’s security team has the resources needed to protect millions of users worldwide.

For more information, read the full PEP 811 governance document or explore the PSF website.

Related Articles

Recommended

Discover More

American Express Debuts Agentic Commerce Toolkit for AI Transactions – But Validation Process Remains OpaqueRussia-Linked Hackers Hijack Routers to Steal Microsoft Office Authentication Tokens: Q&ALeveraging Simulation to Solve Power System Design Challenges: Corona and HVDC Cable FieldsElevance Health Faces Legal Obstacle in Major Medicare Advantage Fraud Case Over Executive DepositionMastering Data Analysis with Python: A Step-by-Step Tutorial