Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
This is a collection of python libraries and scripts that manipulate empirical game data.
This package is hosted on pypi. Install it with pip install gameanalysis
.
The entry point from the command line is ga
. ga --help
will document all
available options.
The entry point for python is gameanalysis
. See the documentation for what is
available from the python interface.
After cloning this repository, the included Makefile
includes all the relevant actions to facilitate development.
Typing make
without targets will print out the various actions to help development.
Type make setup
to configure a virtual environment for development.
All of the tests can be run with make test
.
Running make check
will search for style compliance, and make format
will try to fix some in places.
make docs
will make the documentation.
FAQs
A python module for analyzing sparse and empirical games
We found that gameanalysis demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.