
Research
Security News
The Growing Risk of Malicious Browser Extensions
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
Tools for the management of inventory databases and impact assessment methods. Part of the Brightway LCA framework.
This package provides tools for the management of inventory databases and impact assessment methods. It is part of the Brightway LCA framework. Online documentation is available, and the source code is hosted on GitHub brightway-lca organization.
Note that version 4.0 and higher are only compatible with Brightway 2.5, as described in the changelog.
You can install bw2data via [pip] from [PyPI]:
$ pip install bw2data
Contributions are very welcome. To learn more, see the Contributor Guide.
Distributed under the terms of the BSD 3 Clause license, bw2data is free and open source software.
If you encounter any problems, please file an issue along with a detailed description.
You can build the documentation locally by installing the documentation Conda environment:
conda env create -f docs/environment.yml
activating the environment
conda activate sphinx_bw2data
and running the build command:
sphinx-build docs _build/html --builder=html --jobs=auto --write-all; open _build/html/index.html
FAQs
Tools for the management of inventory databases and impact assessment methods. Part of the Brightway LCA framework.
We found that bw2data demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
Research
Security News
An in-depth analysis of credential stealers, crypto drainers, cryptojackers, and clipboard hijackers abusing open source package registries to compromise Web3 development environments.
Security News
pnpm 10.12.1 introduces a global virtual store for faster installs and new options for managing dependencies with version catalogs.