
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Tooling to access and curate Concepticon data.
pyconcepticon
can be installed from PyPI running
pip install pyconcepticon
Note that pyconcepticon
requires a clone or export of the concepticon data repository.
To use pyconcepticon
you must have a local copy of the Concepticon data, i.e. either
Assuming you have downloaded release 1.2.0
and unpacked the sources to a directory
clld-concepticon-data-41d2bf0
, you can access
the data as follows:
>>> from pyconcepticon import Concepticon
>>> api = Concepticon('clld-concepticon-data-41d2bf0')
>>> conceptlist = list(api.conceptlists.values())[0]
>>> conceptlist.author
'Perrin, Loïc-Michel'
>>> conceptlist.tags
['annotated']
>>> len(conceptlist.concepts)
110
>>> list(conceptlist.concepts.values())[0]
Concept(
id='Perrin-2010-110-1', number='1', concepticon_id='1906', concepticon_gloss='SOUR', gloss=None,
english='ACID', attributes={'german': 'sauer', 'french': 'acide'},
_list=Conceptlist(
_api=<pyconcepticon.api.Concepticon object at 0x7f31693be518>,
id='Perrin-2010-110', author='Perrin, Loïc-Michel', year=2010, list_suffix='', items=110,
tags=['annotated'], source_language=['english', 'french', 'german'],
target_language='Global',
url='https://journals.dartmouth.edu/cgi-bin/WebObjects/Journals.woa/xmlpage/1/article/353?htmlOnce=yes',
refs=['Perrin2010'], pdf=['Perrin2010'],
note='This list was used as an initial questionnaire for colexification studies on a world-wide sample of languages.',
pages='276f', alias=[], local=False))
Having installed pyconcepticon
, you can also directly query concept lists via the terminal command
concepticon
. To learn about the functionality it provides run
$ concepticon -h
usage: concepticon [-h] [--log-level LOG_LEVEL] [--repos REPOS]
[--repos-version REPOS_VERSION]
COMMAND ...
optional arguments:
-h, --help show this help message and exit
--log-level LOG_LEVEL
log level [ERROR|WARN|INFO|DEBUG] (default: 20)
--repos REPOS clone of concepticon/concepticon-data
--repos-version REPOS_VERSION
version of repository data. Requires a git clone!
(default: None)
available commands:
Run "COMAMND -h" to get help for a specific command.
COMMAND
attributes Print all columns in concept lists that contain
surplus information.
...
To learn about individual subcommands run concepticon COMMAND -h
, e.g.
$ concepticon lookup -h
usage: concepticon lookup [-h]
[--format {fancy_grid,fancy_outline,github,grid,html,jira,latex,latex_booktabs,latex_longtable,latex_raw,mediawiki,moinmoin,orgtbl,pipe,plain,presto,pretty,psql,rst,simple,textile,tsv,unsafehtml,youtrack}]
[--similarity SIMILARITY] [--full-search]
[--language LANGUAGE]
GLOSS [GLOSS ...]
Look up the specified glosses in Concepticon.
positional arguments:
GLOSS
optional arguments:
-h, --help show this help message and exit
--format {fancy_grid,fancy_outline,github,grid,html,jira,latex,latex_booktabs,latex_longtable,latex_raw,mediawiki,moinmoin,orgtbl,pipe,plain,presto,pretty,psql,rst,simple,textile,tsv,unsafehtml,youtrack}
Format of tabular output. (default: simple)
--similarity SIMILARITY
specify level of similarity for concept mapping
(default: 5)
--full-search select between approximate search (default) and full
search (default: False)
--language LANGUAGE specify your desired language for mapping (default:
en)
The Python API as well as the CLI can lookup the location of the data from a
cldfcatalog
config file, under the key concepticon
.
Such a config file (and the repository clone) can be created automatically,
by installing cldfbench
and running
cldfbench config
.
FAQs
programmatic curation of concepticon-data
We found that pyconcepticon demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.