Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
This package provides a Python API to inspect and validate NeXus files written in the HDF5 format.
The latest development version is always available from NeXpy's GitHub repository.
Released versions of nxvalidate
can be installed using
% pip install nxvalidate
The source code can be downloaded from the NeXpy Git repository:
% git clone http://github.com/nexpy/nxvalidate.git
The only prerequisite required to install the nxvalidate
package is
the nexusformat package. There
are more details of further dependencies in the NeXpy
documentation.
At the moment, the nxvalidate
package provides a single command-line script.
% nxinspect -h
usage: nxinspect [-h] [-f FILENAME] [-p PATH] [-a [APPLICATION]]
[-b BASECLASS] [-i] [-w] [-e] [-v]
Inspects and validates NeXus files.
options:
-h, --help show this help message and exit
-f FILENAME, --filename FILENAME
name of the NeXus file to be validated
-p PATH, --path PATH path to group to be validated in the NeXus file
-b BASECLASS, --baseclass BASECLASS
name of the base class to be listed
-a [APPLICATION], --application [APPLICATION]
validate the NeXus file against its application definition
-d DEFINITIONS, --definitions DEFINITIONS
path to the directory containing NeXus definitions
-i, --info output info messages in addition to warnings and errors
-w, --warning output info messages in addition to warnings and errors
-e, --error output info messages in addition to warnings and errors
-v, --version show program's version number and exit
N.B., the command is
nxinspect
, rather thannxvalidate
to avoid confusion with the C-library.
% nxinspect -f <filename.nxs> -e
The --info
, --warning
and --error
switches control how much
information is output. The default is --warning
.% nxinspect -f <filename.nxs> -d /path/to/definitions
The directory should contain two sub-directories, applications
and
base_classes
containing the NXDL files needed to validate the
specified NeXus file.% nxinspect -f <filename.nxs> -a
% nxinspect -f <filename.nxs> -a <application.nxdl.xml>
% nxinspect -b <base-class-name>
Information about the Python API for reading and writing NeXus files is available as part of the NeXpy documentation. If you have any general questions concerning the use of this package, please address them to the NeXus Mailing List. If you discover any bugs, please submit a Github issue, preferably with relevant tracebacks.
This package was developed jointly by Kaitlyn Marlor, Justin Wozniak, and Ray Osborn. The NeXus data format standard has been developed under the supervision of the NeXus International Advisory Committee.
FAQs
A Python package for validating NeXus files
We found that nxvalidate demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.