
Research
Security News
The Growing Risk of Malicious Browser Extensions
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
A data model and validation tool for PHIR (PECOS High-level Intermediate Representation).
phir
models the PHIR specification as a Pydantic model.
See our docs.
Included is the tool phir-cli
that provides validation and pretty printing on the command line.
Python >=3.10
Just issue pip install phir
to obtain the latest stable release.
The package includes a CLI for directly validating PHIR JSON files using the command line.
❯ phir-cli -h
usage: phir-cli [-h] [-s] [-v] [jsonfile]
Validates and pretty prints valid PHIR
positional arguments:
jsonfile json file to validate against PHIR spec
options:
-h, --help show this help message and exit
-s, --schema dump JSON schema of the PHIR model and exit
-v, --version show program's version number and exit
Clone the repository and run:
python -m venv .venv
source .venv/bin/activate
pip install -U pip setuptools
pip install -r requirements.txt
pre-commit install
Then, install the project using:
pip install -e .
See Makefile
for other useful commands.
Issue pytest
from the root directory.
FAQs
A data model and validation tool for PHIR (PECOS High-level Intermediate Representation).
We found that phir demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
Research
Security News
An in-depth analysis of credential stealers, crypto drainers, cryptojackers, and clipboard hijackers abusing open source package registries to compromise Web3 development environments.
Security News
pnpm 10.12.1 introduces a global virtual store for faster installs and new options for managing dependencies with version catalogs.