Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
A repackaging of Cling, the LLVM-based interactive C++ interpreter, as a library for use as the backend to cppyy. This version of Cling is patched for improved performance and better use with Python.
Wheels are available for the major platforms, but if you have to build from source, building of LLVM will take a long time. By default, all cores will be used, but it is also recommended to add the verbose flag to see progress:
$ python -m pip install --verbose cppyy-cling
For further details, see cppyy's installation instructions: https://cppyy.readthedocs.io/en/latest/installation.html
Cling documentation is here: https://github.com/vgvassilev/cling
Full cppyy documentation is here: http://cppyy.readthedocs.io/
Change log: https://cppyy.readthedocs.io/en/latest/changelog.html
Bug reports/feedback: https://github.com/wlav/cppyy/issues
FAQs
Re-packaged Cling, as backend for cppyy
We found that cppyy-cling demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.