In this presentation, you’ll understand why you learned graph theory and machine learning at university 🙂 The speaker will discuss what awaits you in the Python ecosystem if you carelessly download a Trojan-infected project. We will explore the obfuscation techniques used by malicious actors to complicate their detection and analysis — and how to counter them using AST Transformers. We will also demonstrate how machine learning can be effectively used to detect malicious projects.