Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Digital terrain map manipulation library.
High level scripts to convert, transform, manipulate small and large imagery using GDAL in python to cover part of the needs of the NASA/ESA Frontier Development Lab with respect to Space Resources challenges.
pip install mapstery
For developers, you might like to install the last version from git. So if you've
cloned Mapstery in a folder called mapstery_repo
then you could do the following:
pip install mapstery_repo/
NB: Make sure the gdal python package version correspond to the system gdal library. If you have GDAL python installation problems you may have to match versions between gdal system libraries and gdal python package, one way or another.
import mapstery
import numpy as np
M = mapstery.Map(500, 500)
M.add_band(np.ones((35,50))*128.0, "BAND_NAME_01")
M.add_band(np.ones((80,150))*89.0, "BAND_NAME_02")
M.save("/tmp/mastery_test0.gtif")
import mapstery
import numpy as np
M = mapstery.Map(500, 500)
M.dataset='layers.json'
M.save("/tmp/testjson.gtif")
{
"BNAME":"LRO1.png",
"BNAME2":"LRO2.png"
}
# BNAME - BAND NAME
# LRO1.png - file path
You can write your own scripts in tests/
starting with the dev_ prefix so that they are ignored by git.
FAQs
Digital terrain map manipulation high level functions
We found that mapstery demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.