
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
A feature-rich python package for interacting with the US Securities and Exchange Commission API: EDGAR
You can install the package using pip:
pip install edgar-sec
Or install from conda-forge:
conda install -c conda-forge edgar-sec
For type checking support, install with optional type stubs:
pip install edgar-sec[types]
We recommend using a virtual environment with either installation method.
I recommend consulting the documentation at: https://nikhilxsunder.github.io/edgar-sec/
Here is a simple example of how to use the package:
# EDGAR API
import edgar_sec as ed
edgar = ed.EdgarAPI()
# Get company concept disclosures
company_concept = edgar.get_company_concept(central_index_key='0001067983', taxonomy='us-gaap', tag='AccountsPayableCurrent')
print(company_concept.label)
# Get company concept disclosures (async)
import asyncio
async def main():
edgar = ed.EdgarAPI().Async
company_concept = await edgar.get_company_concept(central_index_key='0001067983', taxonomy='us-gaap', tag='AccountsPayableCurrent')
print(company_concept.label)
asyncio.run(main())
Edgar-SEC uses GitHub Actions for continuous integration. The following workflows run automatically:
These checks ensure that all contributions maintain code quality and don't introduce regressions.
Status badges at the top of this README reflect the current state of our CI pipelines.
Edgar-SEC uses standard Python packaging tools:
To set up the development environment:
# Install Poetry
curl -sSL https://install.python-poetry.org | python3 -
# Clone the repository
git clone https://github.com/nikhilxsunder/edgar-sec.git
cd edgar-sec
# Install dependencies
poetry install
# Run tests
poetry run pytest
The project uses pytest as its testing framework. Tests are located in the tests/
directory.
To run the complete test suite:
poetry run pytest
For running tests with coverage reports:
poetry run pytest --cov=edgar_sec tests/
To run a specific test file:
poetry run pytest tests/specific_module_test.py
We aim to maintain a minimum of 80% code coverage across the codebase. This includes:
Continuous integration automatically runs tests on all pull requests and commits to the main branch.
Edgar-SEC requires tests for all new functionality. When contributing:
tests/
directoryFor information about reporting security vulnerabilities in Edgar-SEC, please see our Security Policy.
Contributions are welcome! Please open an issue or submit a pull request.
This project is licensed under the GNU Affero General Public License v3.0 - see the LICENSE file for details.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.