
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Utility functions for working with AWS resources though Boto3 with less hiccups.
Amplify builds innovative and compelling digital educational products that empower teachers and students across the country. We have a long history as the leading innovator in K-12 education - and have been described as the best tech company in education and the best education company in tech. While others try to shrink the learning experience into the technology, we use technology to expand what is possible in real classrooms with real students and teachers.
amplify_aws_utils requires the following to be installed:
python >= 3.8
This package can be installed using pip
pip install amplify_aws_utils
For development, tox>=2.9.1
is recommended.
Python package can be built as follows:
python setup.py sdist
This creates a package in dist
directory.
amplify_aws_utils
uses tox
. You will need to install tox with pip install tox
.
Running tox
will automatically execute linters as well as the unit tests. You can also run them individually with
the -e argument.
For example, tox -e lint,py38-unit
will run the linters, and then the unit tests in python 3.8
To see all the available options, run tox -l
.
Deployment is done with Travis.
Package is built as described above, and is uploaded to PyPI repo using devpi-client
Functions provided by this package can be imported after package has been installed.
Example:
from amplify_aws_utils.resource_helper import throttled_call
FAQs
Utility functions for working with AWS resources
We found that amplify-aws-utils demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.