
Research
/Security News
11 Malicious Go Packages Distribute Obfuscated Remote Payloads
Socket uncovered 11 malicious Go packages using obfuscated loaders to fetch and execute second-stage payloads via C2 domains.
Python client for interacting with the CoffeeBlack visual reasoning API.
You can install the package using pip:
# Install from PyPI
pip install coffeeblack
# Install from local directory
pip install -e .
# Or install from GitHub
pip install git+https://github.com/coffeeblack/sdk.git
import asyncio
import os
from coffeeblack import Argus
async def main():
# Initialize the SDK with API key for authentication
# You can provide your API key directly or through an environment variable
api_key = os.environ.get("COFFEEBLACK_API_KEY")
sdk = Argus(
api_key=api_key, # API key for authentication
verbose=True,
debug_enabled=True,
elements_conf=0.2,
rows_conf=0.4,
model="ui-detect" # Set the UI detection model to use (cua, ui-detect, or ui-tars)
)
# Define the browser name
browser_name = "Safari"
try:
# Open and attach to the browser
await sdk.open_and_attach_to_app(browser_name, wait_time=2.0)
# Execute an action based on a natural language query
await sdk.execute_action("Type https://www.google.com into the url bar")
# Press enter key
await sdk.press_key("enter")
except Exception as e:
print(f"Error: {e}")
if __name__ == "__main__":
asyncio.run(main())
MIT
For more detailed documentation, please visit https://docs.coffeeblack.ai
FAQs
Python client for interacting with the CoffeeBlack visual reasoning API
We found that coffeeblack demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
Socket uncovered 11 malicious Go packages using obfuscated loaders to fetch and execute second-stage payloads via C2 domains.
Security News
TC39 advances 11 JavaScript proposals, with two moving to Stage 4, bringing better math, binary APIs, and more features one step closer to the ECMAScript spec.
Research
/Security News
A flawed sandbox in @nestjs/devtools-integration lets attackers run code on your machine via CSRF, leading to full Remote Code Execution (RCE).