
Research
Security News
Malicious npm Packages Use Telegram to Exfiltrate BullX Credentials
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
ldap
on PyPIThis dummy project is not installable.
You probably want python-ldap
instead.
The widely used python-ldap project provides
an importable module named ldap
.
This goes against the convention that PyPI distribution names should match the module names. But, python-ldap pre-dates wide use of that convention, and the issue is hard to fix now.
Please install python-ldap
to get the LDAP bindings.
The ldap
name on PyPI was used for an unrelated collection of
LDAP-related utilities, which is not as popular, and confused users who
install ldap
to get the ldap
module.
The project is no longer developed.
It is archived as 1.0.x
releases on PyPI, and on
GitHub.
This could have been a placeholder package that depends on python-ldap
,
saving you the trouble of reading this message.
However, pip
has trouble
with differently-named packages that provide the same module.
When you see the exception:
ModuleNotFoundError: No module named 'foo'
… please research the actual requirements instead of going directly for
pip install foo
.
The project (distribution) name may differ from the module(s) it
provides.
FAQs
Placeholder for the ldap name
We found that ldap demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.
Security News
AI-generated slop reports are making bug bounty triage harder, wasting maintainer time, and straining trust in vulnerability disclosure programs.