Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
This package contains helper tools for working with gRPC services in Python.
Specifically it provides import hooks for the Python import machinery which lets users import .proto
files directly
without having to precompile them, and a gRPC server setup wrapper to streamline the process of hosting gRPC services.
Register import hooks by calling register_import_hook()
. This call optionally takes the arguments save_compiled
,
well_known_protos
, and extra_args
, which specifies if compiled Python files should be written into the project
folder and gives additional arguments to protoc
. All arguments are specified per package, for which the closest parent
package or __main__
's configuration is used.
After registration the gRPC importer will auto-magically be used to import modules ending in _pb2
or _pb2_grpc
if
a corresponding .proto
file is present in the same package. The importer checks the modified time on the produced
Python source files to determine if a fresh compile is needed for every import.
This package also includes a helper function serve()
which can be used to start a gRPC server.
FAQs
Helper tools for importing and serving gRPC services
We found that grpcio-helpers demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.