Would it have been better if Meta bought Astral.sh instead?
https://www.reddit.com/r/Python/comments/1ryglss/would_it_have_been_better_if_meta_bought_astralsh/
https://www.reddit.com/r/Python/comments/1ryglss/would_it_have_been_better_if_meta_bought_astralsh/
Reddit
From the Python community on Reddit
Explore this post and more from the Python community
Reinventing Python's AsyncIO
The post explores a redesign of Python’s async runtime, arguing that the current async/await and event-loop model adds unnecessary complexity, and proposing a simpler runtime where concurrency is handled automatically without explicit async syntax.The author experiments with a new runtime approach that can run async workloads 2–3.5× faster than traditional asyncio, suggesting Python’s co...
https://blog.baro.dev/p/reinventing-pythons-asyncio
The post explores a redesign of Python’s async runtime, arguing that the current async/await and event-loop model adds unnecessary complexity, and proposing a simpler runtime where concurrency is handled automatically without explicit async syntax.The author experiments with a new runtime approach that can run async workloads 2–3.5× faster than traditional asyncio, suggesting Python’s co...
https://blog.baro.dev/p/reinventing-pythons-asyncio
Fluxus by gi0baro
Reinventing Python's AsyncIO | Fluxus by gi0baro
My journey (so far) in rethinking Python's async code execution
Visitran
Build data transformation pipelines using Python with a visual IDE and AI assistant.
https://github.com/Zipstack/visitran
Build data transformation pipelines using Python with a visual IDE and AI assistant.
https://github.com/Zipstack/visitran
GitHub
GitHub - Zipstack/visitran: Modern, AI-native and agentic Pythonic data transformation platform.
Modern, AI-native and agentic Pythonic data transformation platform. - Zipstack/visitran
LiteLLM Python package compromised by supply-chain attack
https://github.com/BerriAI/litellm/issues/24512
https://github.com/BerriAI/litellm/issues/24512
GitHub
[Security]: CRITICAL: Malicious litellm_init.pth in litellm 1.82.8 — credential stealer · Issue #24512 · BerriAI/litellm
[LITELLM TEAM] - For updates from the team, please see: #24518 [Security]: CRITICAL: Malicious litellm_init.pth in litellm 1.82.8 PyPI package — credential stealer Summary The litellm==1.82.8 wheel...
The Hidden Mechanism Behind Clean Python APIs (Descriptor Deep Dive)
Descriptors define how Python resolves attribute access, explaining why values sometimes come from the instance, class, or elsewhere in non-obvious ways. Understanding descriptor rules enables cleaner, more reusable designs by giving you precise control over attribute behavior.
https://www.youtube.com/watch?v=7SUzTOkUVLY
Descriptors define how Python resolves attribute access, explaining why values sometimes come from the instance, class, or elsewhere in non-obvious ways. Understanding descriptor rules enables cleaner, more reusable designs by giving you precise control over attribute behavior.
https://www.youtube.com/watch?v=7SUzTOkUVLY
YouTube
The Hidden Mechanism Behind Clean Python APIs (Descriptor Deep Dive)
🧱 Build software that lasts. Join the Software Design Mastery waiting list → https://arjan.codes/mastery.
In this video, I explain what descriptors are, why attribute access in Python sometimes behaves in surprising ways, and how the descriptor rules determine…
In this video, I explain what descriptors are, why attribute access in Python sometimes behaves in surprising ways, and how the descriptor rules determine…
Build Your Own Openclaw - A step by step guide, using python
https://github.com/czl9707/build-your-own-openclaw
https://github.com/czl9707/build-your-own-openclaw
GitHub
GitHub - czl9707/build-your-own-openclaw: A step-by-step guide to build your own AI agent.
A step-by-step guide to build your own AI agent. Contribute to czl9707/build-your-own-openclaw development by creating an account on GitHub.
justx
A TUI command launcher built on top of just. Define recipes once, run them anywhere.
https://github.com/fpgmaas/justx
A TUI command launcher built on top of just. Define recipes once, run them anywhere.
https://github.com/fpgmaas/justx
GitHub
GitHub - fpgmaas/justx: A TUI command launcher built on top of just. Define recipes once, run them anywhere.
A TUI command launcher built on top of just. Define recipes once, run them anywhere. - fpgmaas/justx
agentscope-ai / ReMe
ReMe: Memory Management Kit for Agents - Remember Me, Refine Me.
https://github.com/agentscope-ai/ReMe
ReMe: Memory Management Kit for Agents - Remember Me, Refine Me.
https://github.com/agentscope-ai/ReMe
GitHub
GitHub - agentscope-ai/ReMe: ReMe: Memory Management Kit for Agents - Remember Me, Refine Me.
ReMe: Memory Management Kit for Agents - Remember Me, Refine Me. - agentscope-ai/ReMe
Pydantic AI - Intro to Agentic AI with Pydantic AI framework
We'll look at using Pydantic AI to build agent-based workflows, starting with simple fundamentals, and building up to more complex examples that use vector databases, RAG, multi-agent workflows and more.
https://www.youtube.com/playlist?list=PL-2EBeDYMIbSWGoDzOFm33_5W_ShO-VIi
We'll look at using Pydantic AI to build agent-based workflows, starting with simple fundamentals, and building up to more complex examples that use vector databases, RAG, multi-agent workflows and more.
https://www.youtube.com/playlist?list=PL-2EBeDYMIbSWGoDzOFm33_5W_ShO-VIi
Oxyde ORM
A type-safe, Pydantic-centric asynchronous ORM with a high-performance Rust core designed for clarity, speed, and reliability.
https://github.com/mr-fatalyst/oxyde
A type-safe, Pydantic-centric asynchronous ORM with a high-performance Rust core designed for clarity, speed, and reliability.
https://github.com/mr-fatalyst/oxyde
GitHub
GitHub - mr-fatalyst/oxyde: Oxyde ORM is a type-safe, Pydantic-centric asynchronous ORM with a high-performance Rust core designed…
Oxyde ORM is a type-safe, Pydantic-centric asynchronous ORM with a high-performance Rust core designed for clarity, speed, and reliability. - mr-fatalyst/oxyde
Fixed Python autocomplete
The post suggests that heavy LSP and static analysis approaches are unnecessary for many common autocomplete scenarios. It shows a lightweight, pattern-based approach can deliver faster, more responsive suggestions without full semantic analysis.
https://matan-h.com/better-python-autocomplete
The post suggests that heavy LSP and static analysis approaches are unnecessary for many common autocomplete scenarios. It shows a lightweight, pattern-based approach can deliver faster, more responsive suggestions without full semantic analysis.
https://matan-h.com/better-python-autocomplete
Matan-h
Fixed Python autocomplete
I fixed autocomplete sorting
Smello
A developer tool that captures outgoing HTTP requests from your code and displays them in a local web dashboard.
https://github.com/smelloscope/smello
A developer tool that captures outgoing HTTP requests from your code and displays them in a local web dashboard.
https://github.com/smelloscope/smello
GitHub
GitHub - smelloscope/smello: A developer tool that captures outgoing HTTP requests from your code and displays them in a local…
A developer tool that captures outgoing HTTP requests from your code and displays them in a local web dashboard - smelloscope/smello
claude-howto
A visual, example-driven guide to Claude Code - from basic concepts to advanced agents, with copy-paste templates that bring immediate value.
https://github.com/luongnv89/claude-howto
A visual, example-driven guide to Claude Code - from basic concepts to advanced agents, with copy-paste templates that bring immediate value.
https://github.com/luongnv89/claude-howto
GitHub
GitHub - luongnv89/claude-howto: A visual, example-driven guide to Claude Code — from basic concepts to advanced agents, with copy…
A visual, example-driven guide to Claude Code — from basic concepts to advanced agents, with copy-paste templates that bring immediate value. - luongnv89/claude-howto
How Clean Code Turns Into Overengineering
This video is about how code that looks clean can still hide a bad design, and why overusing tiny abstractions can make a program harder to understand and change. It refactors a Python reporting example by simplifying the structure, making the pipeline explicit, and focusing on cohesion over smallness.
https://www.youtube.com/watch?v=U4sPMwAiXco
This video is about how code that looks clean can still hide a bad design, and why overusing tiny abstractions can make a program harder to understand and change. It refactors a Python reporting example by simplifying the structure, making the pipeline explicit, and focusing on cohesion over smallness.
https://www.youtube.com/watch?v=U4sPMwAiXco
YouTube
Why “Clean Code” Often Creates Worse Designs
→ Get started with Hostinger today: http://hostinger.com/arjancodes (make sure to use coupon ARJANCODES).
In this video, I refactor a small Python program that looks clean on the surface but hides a messy design underneath. Step by step, I remove unnecessary…
In this video, I refactor a small Python program that looks clean on the surface but hides a messy design underneath. Step by step, I remove unnecessary…
Why pylock.toml includes digital attestations
Including digital attestations in pylock.toml allows developers to verify the origin and integrity of dependencies, not just their versions and hashes, improving protection against supply chain attacks. The broader point is that modern package security requires provenance, not just reproducibility, so lock files are evolving from “what to install” into “what can be trusted to install.”
https://snarky.ca/why-pylock-toml-includes-digital-attestations/
Including digital attestations in pylock.toml allows developers to verify the origin and integrity of dependencies, not just their versions and hashes, improving protection against supply chain attacks. The broader point is that modern package security requires provenance, not just reproducibility, so lock files are evolving from “what to install” into “what can be trusted to install.”
https://snarky.ca/why-pylock-toml-includes-digital-attestations/
Tall, Snarky Canadian
Why pylock.toml includes digital attestations
A Python project got hacked where malicious releases were directly uploaded to PyPI. I said on Mastodon that had the project used trusted publishing with digital attestations, then people using a pylock.toml file would have noticed something odd was going…