Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
A hyperintensional theorem prover for modal, counterfactual conditional, constitutive explanatory, and extensional operators.
This project draws on the Z3 SMT solver to provide tooling for finding hyperintensional countermodels and establishing validity over models up to a user specified level of complexity for inferences in a propositional language with the following operators:
neg
for negationwedge
for conjunctionvee
for disjunctionrightarrow
for the material conditionalleftrightarrow
for the material biconditionalboxright
for the must counterfactual conditionalcircleright
for the might counterfactual conditionalBox
for necessityDiamond
for possibilityleq
for ground read 'sufficient for'sqsubseteq
for essence read 'necessary for'equiv
for propositional identity read 'just is for'preceq
for relevanceAccessible installation instructions are provided in the GitHub repository.
To generate a test file run model-checker
in the terminal without arguments.
Alternatively, run model-checker path/to/test_file.py
if the test_file.py
already exists.
A number of examples are provided in the GitHub repository.
Each file may specify the following inputs where the defaults are specified below:
premises = []
.conclusions = []
.N = 3
.max_time = 1
.Optionally, the user can specify a number of additional settings where defaults are provided below:
contingent_bool = False
.contingent_bool = False
.optimize_bool = False
.print_cons_bool = False
.print_impossibe_states_bool = False
.save_bool = False
.Users can override these settings from the command line by including the following flags:
-c
to set contingent_bool = True
.-d
to set disjoint_bool = True
.-o
to set optimize_bool = True
.-p
to set print_cons_bool = True
.-i
to set print_impossibe_states_bool = True
.-s
to set save_bool = True
.Additional flags have been included in order to manage the package version:
-h
to print help information about the package and its usage.-v
to print the installed version number.-u
to upgrade to the latest version.The following section will sketch the underlying semantics. More information can be found in the GitHub repository as well as in this recent manuscript.
The semantics is hyperintensional insofar as sentences are evaluated at states which may be partial rather than total as in intensional semantic theories.
States are modeled by bitvectors of a specified length (e.g., #b00101
has length 5
), where state fusion is modeled by the bitwise OR operator |
.
For instance, #b00101 | #b11001 = #b11101
.
The atomic states have exactly one occurrence of 1
and the null state has no occurrences of 1
.
The space of states is finite and closed under fusion.
States are named by lowercase letters in order to print readable countermodels.
Fusions are printed using .
where a.b
is the fusion of the states a
and b
.
A state a
is part of a state b
just in case a.b = b
.
States may be either possible or impossible where the null state is required to be possible and every part of a possible state is possible.
The states a
and b
are compatible just in case a.b
is possible.
A world state is any state that is both possible and includes every compatible state as a part.
Sentences are assigned verifier states and falsifier states where both the verifiers and falsifiers are required to be closed under fusion.
A sentence is true at a world state w
just in case w
includes a verifier for that sentence as a part and false at w
just in case w
includes a falsifier for that sentence as a part.
In order to ensure that sentence letters have at most one truth-value at each world state, a fusion a.b
is required to be impossible whenever a
is verifier for a sentence letter A
and b
is a falsifier for A
.
Additionally, sentence letters are guaranteed to have at least one truth-value at each world state by requiring every possible state to be compatible with either a verifier or falsifier for any sentence letter.
A negated sentence is verified by the falsifiers for the sentence negated and falsified by the verifiers for the sentence negated. A conjunctive sentence is verified by the pairwise fusions of verifiers for the conjuncts and falsified by falsifiers for either of the conjuncts or fusions thereof. A disjunctive sentence is verified by the verifiers for either disjunct or fusions thereof and falsified by pairwise fusions of falsifiers for the disjuncts. Conjunction and disjunction are dual operators obeying the standard idempotence and De Morgan laws. The absorption laws do not hold, nor does conjunction distribute over disjunction, nor vice versa. For a defense of the background theory of hyperintensional propositions, see this paper.
A necessity sentence Box A
is true at a world just in case every world state includes a part that verifies A
and a possibility sentence Diamond A
is true at a world just in case some world state includes a part that verifies A
.
Given a world state w
and state s
, an s
-alternative to w
is any world state to include as parts both s
and a maximal part of w
that is compatible with s
.
A must counterfactual conditional sentences A boxright B
is true at a world state w
just in case its consequent is true at any s
-alternative to w
for any verifier s
for the antecedent of the counterfactual.
A might counterfactual conditional sentences A boxright B
is true at a world state w
just in case its consequent is true at some s
-alternative to w
for some verifier s
for the antecedent of the counterfactual.
The semantic theory for counterfactual conditionals is motivated and further elaborated in this accompanying paper.
This account builds on Fine 2012 and Fine2012a.
A grounding sentence A leq B
may be read 'A
is sufficient for B
' and an essence sentence A sqsubseteq B
may be read 'A
is necessary for B
'.
A propositional identity sentence A equiv B
may be read 'A
just is for B
'.
A relevance sentence A preceq B
may be read 'A
is wholly relevant to B
'.
The semantics for ground requires every verifier for the antecedent to be a verifier for the consequent, any fusion of a falsifier for the antecedent and consequent to be a falsifier for the consequent, and any falsifier for the consequent to have a part that falsifies the antecedent.
The semantics for essence requires every fusion of a verifier for the antecedent and consequent to be a verifier for the consequent, any verifier for the consequent must have a part that verifies the antecedent, and every falsifier for the antecedent to be a falsifier for the consequent.
The semantics for propositional identity requires the two arguments to have the same verifiers and falsifiers.
The semantics for relevance requires any fusion of verifiers for the antecedent and consequent to be a verifier for the consequent and, similarly, any fusion of falsifiers for the antecedent and consequent to be a falsifier for the consequent.
Whereas the first three constitutive operators are interdefinable, relevance is definable in terms of the other constitutive operators but not vice versa:
A leq B := neg A sqsubseteq neg B := (A vee B) equiv B
.A sqsubseteq B := neg A leq neg B := (A wedge B) equiv B
.A equiv B := (A leq B) wedge (B leq A) := (A sqsubseteq B) wedge (B sqsubseteq A)
.A preceq B := (A wedge B) leq B := (A vee B) sqsubseteq B
.Instead of a Boolean lattice as in extensional and intensional semantics theories, the space of hyperintensional propositions forms a non-interlaced bilattice as described in this paper, building on Fine 2017.
More information can be found in the GitHub repository.
FAQs
A hyperintensional theorem prover for modal, counterfactual conditional, constitutive explanatory, and extensional operators.
We found that model-checker demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.