
Research
wget to Wipeout: Malicious Go Modules Fetch Destructive Payload
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Clin is a command-line utility to manage Nakadi
resources from schema files in "Infrastructure as Code" style.
You can install clin directly from PyPI using pip:
pip install clin
After this you should be able to run the clin
tool:
~ clin --help
Usage: clin [OPTIONS] COMMAND [ARGS]...
...
Please refer to the documentation and examples.
Please read CONTRIBUTING for details on our process for submitting pull requests to us, and please ensure you follow the CODE_OF_CONDUCT.
After cloning the repository, use poetry
to create a new virtual environment
and restore all dependencies.
poetry install
If you're using an IDE (eg. PyCharm), make sure that it's configured to use the
virtual environment created by poetry as the project's interpreter. You can find
the path to the used environment with poetry env info
.
poetry run pytest
We use SemVer for versioning. For the versions available, see the tags on this repository.
See also the list of contributors who participated in this project.
This project is licensed under the MIT License. See the LICENSE file for details.
FAQs
Cli for Nakadi resources management in Infrastructure as Code style
We found that clin demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.
Product
We redesigned Socket's first logged-in page to display rich and insightful visualizations about your repositories protected against supply chain threats.