
Research
Two Malicious Rust Crates Impersonate Popular Logger to Steal Wallet Keys
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
The ConAction library provides mathematical functions that are inspired from the metaphor of the Trinity of Covariation as part of the MSc thesis of Galen Seilis.
Supervisory Committee Members
The code in this repository is intended to support researchers analyzing multivariate data.
The thesis provides an extensive background reading for this package, and can be found at (link needed).
ConAction is available through PyPi, and can be installed via pip
using
pip install conaction
or
pip3 install conaction
from conaction import estimators
import numpy as np
X = np.random.normal(size=1000).reshape((100,10)) # Get a 100 x 10 data table
estimators.pearson_correlation(X) # Compute the 10-linear Pearson correlation coefficient
Build documentation locally:
cd /path/to/conaction/docs
make html
Coming soon.
Coming soon.
@mastersthesis{seilisthesis2022,
author = "Galen Seilis",
title = "ConAction: Efficient Implementations and Applications of Functions Inspired by the Trinity of Covariation",
school = "University of Northern British Columbia",
year = "Unpublished",
address = "3333 University Way, Prince George, British Columbia, V2N 4Z9, Canada",
month = "TBA",
}
FAQs
Efficient implmenetations of instantiations of the Trinity of Covariation.
We found that conaction demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.