Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

package-obfuscator

Package Overview
Dependencies
Maintainers
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

package-obfuscator

An obfuscator for python packages.

  • 1.0.2
  • PyPI
  • Socket score

Maintainers
1

package-obfuscator

Disclaimer

This package was developed as part of the SocialNetworkHarvester by the Freezingdata GmbH. We found the obfuscation of packages to be essential for our work so we developed this package. The package will be maintained as long as we need the functionality for our own software. We do not and cannot guarantee long-term maintenance, nor can be guarantee support in issues. We will nevertheless try to answer all incoming questions in a timely manner. If you want to contribute feel free to create a merge request and open an issue discussing a potential bug or feature. You are free to use this software in any personal or commercial project.

Quick-Start

To install the package-obfuscator run the following command:

pip install package-obfuscator

To use the package-obfuscator either use the cli...

package-obfuscate my_secret_package

or use the package-obfuscator in a script:

import os
import package_obfuscator

current_folder = os.path.dirname(os.path.realpath(__file__))
package_folder = os.path.join(current_folder, 'my_secret_package')

package_obfuscator.obfuscate(package_folder)

CLI

The CLI provides the following options

ArgumentDescriptionDefault
package_location (positional)An absolute or relative path to the package that should be obfuscatedrequired
--output / -oAn absolute or relative path to a folder in which to place the obfuscated package content. If this argument is not provided the obfuscation will take place in the originally provided package_location.package_location
--force-overwrite / -fIf the output folder is existent the obfuscator will exit. You can disable this behaviour and achieve a hard overwrite if you add this option
--short-filenames / -sBy adding this option, shorter filenames will be generated for the obfuscated files by avoiding the default random uuid in filenames.
--py-cache-folder-name / -pProvide a custom filename for the pycache generated folder.

Python API

package_obfuscator

package_obfuscator.obfuscate(package_dir, [output=..., [force_output_overwrite=False]])

ArgumentDescriptionRequired / Optional
package_dirThe absolute or relative path to the package directory.Required
outputThe absolute or relative path to the directory in which to place the obfuscated files. If not provided the obfuscation will take place within the package_dir.Optional
force_output_overwriteIf the output folder exists when running the code the obfuscator will exit with an exception. If you want to force an overwrite you should provide this argument with True.Optional
short_filenamesBy adding this option, shorter filenames will be generated for the obfuscated files by avoiding the default random uuid in filenames.Optional
py_cache_folder_nameProvide a custom filename for the pycache generated folder.Optional

When to use the package-obfuscator

The package-obfuscator should be used prior to releasing your python package in any way. The easiest way is to use the following code structure. Let's assume you are developing a module called my_module. Your directory structure will look something like this:

my-module-repository
  > my_module_source
      > sub_module
          script2.py
      __init__.py
      script1.py
  setup.py

Then it is suggested to use the package-obfuscator as a package in the setup.py.

import package_obfuscator
package_obfuscator.obfuscate('my_module_source', output='my_module')

setup(
    name='my_module',
    version='0.0.1',
    packages=find_packages(include=['my_module', 'my_module.*'])
)

Your wheel will then only include obfuscated code.

How does the obfuscation work?

The obfuscation works by compiling the code within each package-related python file into binary code. It will find all python files (*.py) recursively and ignore all other files. The binary code is then saved into separate files. The original file will execute the binary file using the exec command and the marshal library.

How safe is the obfuscation method?

It is important to note that the obfuscation is not completely secure. It is possible to reverse-engineer your code using the binary files. But even when converting the code back only excerpts of the code will be humanly readable straight away. This method of obfuscation is recommended for code that is not mission-critical but should nevertheless not be deployed as human-readable code.

Test

docker build --rm -t test .
docker run --rm -t -v $(pwd):/root/${PWD##*/} test bash test.sh

Keywords

FAQs


Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc