
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
django-hierarkey
Advanced tools
.. image:: https://img.shields.io/pypi/v/django-hierarkey.svg :target: https://pypi.python.org/pypi/django-hierarkey
.. image:: https://readthedocs.org/projects/django-hierarkey/badge/?version=latest :target: https://django-hierarkey.readthedocs.io/
This package allows you to attach a key-value store to a model, e.g. to store preferences of an user or a customer. The package supports arbitrary datatypes, defaults and model hierarchies, i.e. you can define a different model instance as your instance's parent and the values of the parent instance will be used as default values for the child instances.
This approach has been in use in pretix_ for quite a while, so it has been tested in
production.
Tested with Python 3.9-3.11 and Django 4.2-5.2.
If you discover a security issue, please contact us at security@pretix.eu and see our Responsible Disclosure Policy_ further information.
The code in this repository is published under the terms of the Apache License. See the LICENSE file for the complete license text.
This project is maintained by Raphael Michel mail@raphaelmichel.de. See the AUTHORS file for a list of all the awesome folks who contributed to this project.
.. _pretix: https://github.com/pretix/pretix .. _Responsible Disclosure Policy: https://docs.pretix.eu/trust/security/disclosure/
FAQs
Hierarchical key-value store for django
We found that django-hierarkey demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.