
Security News
New CVE Forecasting Tool Predicts 47,000 Disclosures in 2025
CVEForecast.org uses machine learning to project a record-breaking surge in vulnerability disclosures in 2025.
livecheck_python
using pip
.pip install livecheck_python
Your ID
and Access Key
shown on the LiveCheck+
app on your phone. Any bugs (i.e., exceptions) occurring in your code will be notified to your phone with just these two lines.from livecheck_python import LiveCheck
livecheck = LiveCheck(your_id='', access_key='')
livecheck.log(value={'loss': loss, 'val_loss': val_loss, 'accuracy': accuracy, 'val_accuracy': val_accuracy})
LiveCheck (
your_id: str,
access_key: str,
project_name: Optional[str] = '',
hyperparams: Optional[dict] = None,
notification_period: Optional[float] = 0
) -> LiveCheck
your_id | required | string | Your email used to log in to the mobile app |
access_key | required | string | An access key shown in your account on the mobile app |
project_name | optional | string | Set the project name to make it easier to distinguish logs of different projects on the mobile app |
hyperparams | optional | dictionary | Hyperparameters used to train models in the run (e.g., learning rate) |
notification_period | optional | float | The time in seconds between two consecutive notifications pushed to your mobile. A larger number means fewer notifications. |
set_project_name (
value: str
) -> None
Instead of setting project_name
when initializing LiveCheck using the constructor function above, you can call livecheck.set_project_name()
.
set_hyperparams (
value: dict
) -> None
Instead of setting hyperparams
when initializing LiveCheck using the constructor function above, you can call livecheck.set_hyperparams()
.
!> Currently, the following types of hyperparameters are supported: int
, float
, bool
, and str
.
set_notification_period (
value: float
) -> None
Instead of setting notification_period
when initializing LiveCheck using the constructor function above, you can call livecheck.set_notification_period()
.
After initializing a LiveCheck object using the constructor function above, any exceptions occurring in your code will be automatically notified to your mobile without needing to do anything else.
log (
value: dict,
log_id: Optional[int] = None
) -> None
You can call livecheck.log()
after each event (e.g., after each epoch) you want to save logs to check on the mobile app. You can set a custom log_id
for each function call. Otherwise, the log_id
will start from 1 and automatically increase by 1 after each function call. The logs saved to the cloud by calling this function will be notified and updated to the mobile app on your phone. Two consecutive notifications will be at least 30 seconds apart.
!> Currently, the following types of logs are supported: int
, float
, bool
, and str
.
int
, float
, bool
, and str
.livecheck.log()
function calls is 0.2 seconds.If you use this for your work, please cite the manuscript mentioned below in the outcomes of your work (e.g., academic papers).
@misc{livecheck,
title={LiveCheck: Check Program Bugs Anywhere - Track Your Logs On-the-Go},
author={},
journal={arXiv},
year={2024}
}
Please feel free to contact me at tuan.t.d@ieee.org for inquiries or collaboration opportunities.
FAQs
Check Program Bugs Anywhere - Track Your Logs On-the-Go
We found that livecheck-python demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
CVEForecast.org uses machine learning to project a record-breaking surge in vulnerability disclosures in 2025.
Security News
Browserslist-rs now uses static data to reduce binary size by over 1MB, improving memory use and performance for Rust-based frontend tools.
Research
Security News
Eight new malicious Firefox extensions impersonate games, steal OAuth tokens, hijack sessions, and exploit browser permissions to spy on users.