
Research
Security News
Malicious npm Packages Use Telegram to Exfiltrate BullX Credentials
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
libpysal.cg
– Computational geometrylibpysal.examples
– Built-in example datasetslibpysal.graph
– Graph class encoding spatial weights matriceslibpysal.io
– Input and outputlibpysal.weights
– Spatial weightslibpysal development is hosted on github.
Discussions of development occurs on the developer list as well as Discord.
PySAL-libpysal is under active development and contributors are welcome. If you have any suggestions, feature requests, or bug reports, please open new issues on GitHub. To submit patches, please review PySAL's documentation for developers, the PySAL development guidelines, and the libpysal contributing guidelines before opening a pull request. Once your changes get merged, you’ll automatically be added to the Contributors List.
To search for or report bugs, please see libpysal's issues.
See LICENSE.txt for information on the history of this software, terms & conditions for usage, and a DISCLAIMER OF ALL WARRANTIES.
FAQs
Core components of PySAL - A library of spatial analysis functions
We found that libpysal demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.
Security News
AI-generated slop reports are making bug bounty triage harder, wasting maintainer time, and straining trust in vulnerability disclosure programs.