
Research
/Security News
60 Malicious Ruby Gems Used in Targeted Credential Theft Campaign
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Welcome to the Python core of the Hyoml project — a smart, relaxed parser and formatter for modern data structures.
This package provides the main Hyoml engine, formatters, validators, loaders, and interfaces.
Clone the repository and install locally:
pip install -e ./python
Or navigate into the python/
folder and install:
cd python
pip install -e .
Parse Hyoml content with just a few lines:
from python.interface.hyoml import Hyoml
h = Hyoml()
parsed = h.parse("""
name: Alice
age: 30
country: Wonderland
""")
print(parsed)
Format data back into JSON, YAML, or Hyoml:
print(h.format(parsed, format="json"))
print(h.format(parsed, format="yaml"))
Folder | Purpose |
---|---|
cli/ | CLI commands and entry points |
cloud_storage/ | Cloud storage agent loaders |
examples/ | Example scripts and sample data |
formatters/ | Output formatters (JSON, YAML, XML, etc.) |
interface/ | Main Hyoml interface and helpers |
loader/ | Flexible local and cloud data loaders |
middleware/ | Tag and directive visitors |
parser/ | Relaxed parsers for JSON, YAML, Hyoml |
strict_profiles/ | Profiles for enforcing strict modes |
tests/ | Unit tests for parsers, formatters, utils |
utils/ | Common utility functions (validation, formatting) |
To run all tests:
cd python
pytest tests/
Make sure you have pytest
installed:
pip install pytest
We welcome contributions to parsers, formatters, visitors, and loaders!
MIT License — see LICENSE
file for details.
Happy Parsing with Hyoml! 🎯
FAQs
Hyoml - Intelligent Relaxed Data Parser and Formatter
We found that hyoml demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
Research
/Security News
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.