Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
plugin_jm_server, a plugin for jmcomic that can be used to view comics in a web browser.
想法起源:https://github.com/hect0x7/JMComic-Crawler-Python/issues/192
基于原项目:https://github.com/AiCorein/Flask-Files-Server
为了方便修改,将原项目中的文件复制到本项目中,然后进行修改
pip install plugin_jm_server
from plugin_jm_server import *
# http
server = JmServer(
'D:/',
'password',
)
server.run(
host='0.0.0.0',
port=80,
)
from plugin_jm_server import *
# https
server = JmServer(
'D:/',
'password',
)
server.run(
host='0.0.0.0',
port=443,
ssl_context='adhoc',
)
# 配置文件
plugins:
after_init:
# after_album:
- plugin: jm_server
kwargs:
password: ''
# 代码
from jmcomic import *
op = create_option('op.yml')
op.download_album(123)
# 运行到这里,虽然主线程代码执行完毕,但程序不会退出,因为服务器线程还没有结束。
# 控制台会输出提示信息如下(atexit时输出的):
# “主线程执行完毕,但插件jm_server的服务器线程仍运行中,可按下ctrl+c结束程序”
# 此时需要你主动按下ctrl+c终止程序。
# python 3.12 特别注意:需要插入下面这行代码,服务器才能继续处理请求
op.wait_all_plugins_finish()
FAQs
plugin_jm_server, a plugin for jmcomic that can be used to view comics in a web browser.
We found that plugin-jm-server demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.