Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Country groups as lists of ISO codes, especially those related to the UNFCCC climate policy process
Data Package, Python and JavaScript module with country groups.
The Data Package contains the lists as CSV or JSON file used to build the language modules and can be loaded with the respective language tools. Some lists contain additional information like date of joining etc.
The Python module can be installed from PyPI:
pip install countrygroups
It contains lists with three-letter codes:
from countrygroups import EUROPEAN_UNION
print(EUROPEAN_UNION)
# =>
# ['AUT', 'BEL', 'BGR', 'CYP', 'CZE', 'DEU', 'DNK', 'ESP', 'EST', 'FIN', 'FRA',
# 'GRC', 'HRV', 'HUN', 'IRL', 'ITA', 'LTU', 'LUX', 'LVA', 'MLT', 'NLD', 'POL',
# 'PRT', 'ROU', 'SVK', 'SVN', 'SWE']
print(EUROPEAN_UNION.names)
# =>
# ['Austria', 'Belgium', 'Bulgaria', 'Croatia', 'Cyprus', 'Czechia', 'Denmark',
# 'Estonia', 'Finland', 'France', 'Germany', 'Greece', 'Hungary', 'Ireland',
# 'Italy', 'Latvia', 'Lithuania', 'Luxembourg', 'Malta', 'Netherlands',
# 'Poland', 'Portugal', 'Romania', 'Slovakia', 'Slovenia', 'Spain', 'Sweden']
The JavaScript module can be installed with npm:
npm install countrygroups
It contains arrays with three-letter codes:
var g7 = require("countrygroups").G7
console.log(g7) // => [ 'CAN', 'DEU', 'EUU', 'FRA', 'GBR', 'ITA', 'JPN', 'USA' ]
Sources: List of Annex I Parties to the Convention
Sources: Greenhouse gas inventory submissions from non-Annex I Parties
Sources: AOSIS - Members
Sources: AR5 Region Definitions
Sources: UNFCCC - Party Groupings
Sources: -
Sources: UNFCCC - Party Groupings
Sources: EU member countries in brief
Sources: -
Sources: -
Sources: The Member States of the Group of 77
Sources: LDCs at a Glance
Sources: UN Treaty Collection - Convention on the International Maritime Organization
Sources: LDCs at a Glance: List of all LDCs in PDF format, (updated 24 Nov 2021)
Sources: UN-OHRLLS: Landlocked Developing Countries
Sources: List of Non-Annex I Parties to the Convention
Sources: List of OECD Member countries - Ratification of the Convention on the OECD
Sources: OPEC - Member Countries
Sources: Small Island Developing States, List of SIDS
data/montreal_protocol_countries.json
data/montreal_protocol_high_ambient_temp.csv
Sources: Article 5 / Non-Article 5 status Group 1 and 2 and high-ambient-temperature classification
data/sids-non-un-or-regional-commissions-associates.csv
Sources: Small Island Developing States, List of SIDS
Sources: -
Sources: UN Climate Change Party Groupings
Sources: United Nations Regional Groups of Member States
Sources: Status of Ratification of the Convention
data/unstats-geographical-regions.json
Sources: UN Statistics Division - Standard country or area codes for statistical use (M49)
The Makefile
used to generate the CSV files requires Python3 and will
automatically install its dependencies into a Virtualenv when run with
make
FAQs
Country groups as lists of ISO codes, especially those related to the UNFCCC climate policy process
We found that countrygroups demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.