Research
Security News
Malicious npm Package Targets Solana Developers and Hijacks Funds
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
This package was developed as part of the SocialNetworkHarvester by the Freezingdata GmbH. We found the obfuscation of packages to be essential for our work so we developed this package. The package will be maintained as long as we need the functionality for our own software. We do not and cannot guarantee long-term maintenance, nor can be guarantee support in issues. We will nevertheless try to answer all incoming questions in a timely manner. If you want to contribute feel free to create a merge request and open an issue discussing a potential bug or feature. You are free to use this software in any personal or commercial project.
To install the package-obfuscator run the following command:
pip install package-obfuscator
To use the package-obfuscator either use the cli...
package-obfuscate my_secret_package
or use the package-obfuscator in a script:
import os
import package_obfuscator
current_folder = os.path.dirname(os.path.realpath(__file__))
package_folder = os.path.join(current_folder, 'my_secret_package')
package_obfuscator.obfuscate(package_folder)
The CLI provides the following options
Argument | Description | Default |
---|---|---|
package_location (positional) | An absolute or relative path to the package that should be obfuscated | required |
--output / -o | An absolute or relative path to a folder in which to place the obfuscated package content. If this argument is not provided the obfuscation will take place in the originally provided package_location . | package_location |
--force-overwrite / -f | If the output folder is existent the obfuscator will exit. You can disable this behaviour and achieve a hard overwrite if you add this option | |
--short-filenames / -s | By adding this option, shorter filenames will be generated for the obfuscated files by avoiding the default random uuid in filenames. | |
--py-cache-folder-name / -p | Provide a custom filename for the pycache generated folder. |
package_obfuscator
package_obfuscator.obfuscate(package_dir, [output=..., [force_output_overwrite=False]])
Argument | Description | Required / Optional |
---|---|---|
package_dir | The absolute or relative path to the package directory. | Required |
output | The absolute or relative path to the directory in which to place the obfuscated files. If not provided the obfuscation will take place within the package_dir . | Optional |
force_output_overwrite | If the output folder exists when running the code the obfuscator will exit with an exception. If you want to force an overwrite you should provide this argument with True . | Optional |
short_filenames | By adding this option, shorter filenames will be generated for the obfuscated files by avoiding the default random uuid in filenames. | Optional |
py_cache_folder_name | Provide a custom filename for the pycache generated folder. | Optional |
package-obfuscator
The package-obfuscator
should be used prior to releasing your python package in any way. The easiest way is to use the following code structure. Let's assume you are developing a module called my_module
. Your directory structure will look something like this:
my-module-repository
> my_module_source
> sub_module
script2.py
__init__.py
script1.py
setup.py
Then it is suggested to use the package-obfuscator
as a package in the setup.py
.
import package_obfuscator
package_obfuscator.obfuscate('my_module_source', output='my_module')
setup(
name='my_module',
version='0.0.1',
packages=find_packages(include=['my_module', 'my_module.*'])
)
Your wheel will then only include obfuscated code.
The obfuscation works by compiling the code within each package-related python file into binary code. It will find all python files (*.py
) recursively and ignore all other files. The binary code is then saved into separate files. The original file will execute the binary file using the exec
command and the marshal
library.
It is important to note that the obfuscation is not completely secure. It is possible to reverse-engineer your code using the binary files. But even when converting the code back only excerpts of the code will be humanly readable straight away. This method of obfuscation is recommended for code that is not mission-critical but should nevertheless not be deployed as human-readable code.
docker build --rm -t test .
docker run --rm -t -v $(pwd):/root/${PWD##*/} test bash test.sh
FAQs
An obfuscator for python packages.
We found that package-obfuscator demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.
Security News
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.