Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
dragonfly-grasshopper
Advanced tools
:dragon: :green_book: Dragonfly plugin for Grasshopper (aka. dragonfly[+]).
This repository contains all Grasshopper components for the dragonfly plugin.
The package includes both the user objects (.ghuser
), the Python source (.py
),
and a JSON version of the grasshopper component data.
Note that this library only possesses the Grasshopper components and, in order to
run the plugin, the core libraries must be installed in a way that they can be
discovered by Rhino (see dependencies).
The dragonfly-grasshopper plugin has the following dependencies (other than Rhino/Grasshopper):
The dragonfly-grasshopper plugin also requires the Grasshopper components within the following repositories to be installed in order to work correctly:
See the Wiki of the lbt-grasshopper repository for the installation instructions for the entire Ladybug Tools Grasshopper plugin (including this repository).
FAQs
Dragonfly plugin for Grasshopper.
We found that dragonfly-grasshopper demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.