
Research
NPM targeted by malware campaign mimicking familiar library names
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
A feature-rich python package for interacting with the US Securities and Exchange Commission API: EDGAR
You can install the package using pip:
pip install edgar-sec
edgar-sec is available on Anaconda through the author's channel:
conda install -c nikhilxsunder edgar-sec
We recommend creating a dedicated environment:
conda create -n edgar-env
conda activate edgar-env
conda install -c nikhilxsunder edgar-sec
Note: edgar-sec will be submitted to conda-forge in the future for broader distribution.
I recommend consulting the documentation at: https://nikhilxsunder.github.io/edgar-sec/
Here is a simple example of how to use the package:
# EDGAR API
import edgar_sec as ed
edgar = ed.EdgarAPI()
# Get company concept disclosures
company_concept = edgar.get_company_concept(central_index_key='0001067983', taxonomy='us-gaap', tag='AccountsPayableCurrent')
print(company_concept.label)
# Get company concept disclosures (async)
import asyncio
async def main():
edgar = ed.EdgarAPI()
company_concept = await edgar.get_company_concept(central_index_key='0001067983', taxonomy='us-gaap', tag='AccountsPayableCurrent')
print(company_concept.label)
asyncio.run(main())
Edgar-SEC uses GitHub Actions for continuous integration. The following workflows run automatically:
These checks ensure that all contributions maintain code quality and don't introduce regressions.
Status badges at the top of this README reflect the current state of our CI pipelines.
Edgar-SEC uses standard Python packaging tools:
To set up the development environment:
# Install Poetry
curl -sSL https://install.python-poetry.org | python3 -
# Clone the repository
git clone https://github.com/nikhilxsunder/edgar-sec.git
cd edgar-sec
# Install dependencies
poetry install
# Run tests
poetry run pytest
The project uses pytest as its testing framework. Tests are located in the tests/
directory.
To run the complete test suite:
poetry run pytest
For running tests with coverage reports:
poetry run pytest --cov=edgar_sec tests/
To run a specific test file:
poetry run pytest tests/test_specific_module.py
We aim to maintain a minimum of 80% code coverage across the codebase. This includes:
Continuous integration automatically runs tests on all pull requests and commits to the main branch.
Edgar-SEC requires tests for all new functionality. When contributing:
tests/
directoryFor information about reporting security vulnerabilities in Edgar-SEC, please see our Security Policy.
Contributions are welcome! Please open an issue or submit a pull request.
This project is licensed under the GNU Affero General Public License v3.0 - see the LICENSE file for details.
FAQs
A feature-rich python package for interacting with the US Securities and Exchange Commission API: EDGAR
We found that edgar-sec demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
Research
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.