
Research
/Security News
Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader
North Korean threat actors deploy 67 malicious npm packages using the newly discovered XORIndex malware loader.
Python wraper for Legal Entity Identification API and ISIN to LEI and vice versa conversion.
This project is wraper for Leilex, legal entity identifier API. Includes ISIN-LEI conversion. Search LEI number using company name.
After installing the module, first step is to download the data for ISIN and LEI mappings
>>> from python_lei.utils import Download
>>> Download()
This will download latest ISIN LEI mappings into resources directory. This is only necessary if you want to use ISIN LEI conversion.
>>> from python_lei.pylei import pyLEI
>>> getinfo = pyLEI()
>>> raw_output, lei_results, dataframe = getinfo.get_lei_info(["A23RUXWKASG834LTMK28"], return_dataframe=True)
>>> print(raw_output)
[{'total_record_count': 1,
'page_number': 1,
'page_size': 100,
'total_pages': 1,
'has_more': False,
'records': [{'LEI': 'A23RUXWKASG834LTMK28',
'LegalName': 'AUTOLIV, INC.',
'LegalJurisdiction': 'US-DE',
'LegalForm': 'XTIQ',
'OtherLegalForm': '',
'EntityStatus': 'ACTIVE',
'EntityExpirationDate': None,
'EntityExpirationReason': '',
'SuccessorEntity': '',
'InitialRegistrationDate': '2012-06-06T03:52:00.000 +00:00',
'LastUpdateDate': '2019-12-18T03:32:00.000 +00:00',
'RegistrationStatus': 'ISSUED',
'NextRenewalDate': '2020-12-15T10:15:00.000 +00:00',
'ManagingLOU': 'EVK05KS7XY1DEII3R011',
'ValidationSources': 'FULLY_CORROBORATED',
'AssociatedLEI': '',
'AssociatedEntityName': '',
'AssociatedEntityType': '',
'RegistrationAuthorityID': 'RA000602 ',
'OtherRegistrationAuthorityID': '',
'RegistrationAuthorityEntityID': '2155072',
'EntityCategory': '',
'Addresses': [{'Line1': 'Box 70381',
'Line2': '',
'Line3': '',
'Line4': '',
'City': 'Stockholm',
'Region': 'SE-AB',
'Country': 'SE',
'PostalCode': '107 24',
'OtherType': '',
'AddressType': 'HEADQUARTERS_ADDRESS'},
{'Line1': 'C/O THE CORPORATION TRUST COMPANY',
'Line2': 'CORPORATION TRUST CENTER 1209 ORANGE ST',
'Line3': '',
'Line4': '',
'City': 'WILMINGTON',
'Region': 'US-DE',
'Country': 'US',
'PostalCode': '19801',
'OtherType': '',
'AddressType': 'LEGAL_ADDRESS'}],
'OtherNames': [],
'ValidationAuthorities': [{'ValidationAuthorityID': 'RA000602',
'OtherValidationAuthorityID': '',
'ValidationAuthorityEntityID': '2155072'}],
'Relationships': [],
'ReportingExceptions': [{'LEI': 'A23RUXWKASG834LTMK28',
'ExceptionCategory': 'DIRECT_ACCOUNTING_CONSOLIDATION_PARENT',
'ExceptionReasons': [{'Reason': 'NON_CONSOLIDATING'}],
'ExceptionReferences': []},
{'LEI': 'A23RUXWKASG834LTMK28',
'ExceptionCategory': 'ULTIMATE_ACCOUNTING_CONSOLIDATION_PARENT',
'ExceptionReasons': [{'Reason': 'NON_CONSOLIDATING'}],
'ExceptionReferences': []}]}]}]
# Class based retrieval
>>> print(lei_results.lei_names)
['AUTOLIV, INC.']
>>> print(lei_results.lei_list)
['A23RUXWKASG834LTMK28']
# Dataframe
>>> print(dataframe[["LEI", "Legal_Name"]])
| | LEI | Legal_Name |
|---:|:---------------------|:--------------|
| 0 | A23RUXWKASG834LTMK28 | AUTOLIV, INC. |
# LEI TO ISIN
>>> from python_lei.isin_lei import ISINtoLEI, LEItoISIN
>>> lei_to_isin = LEItoISIN()
>>> isin_list, dataframe = lei_to_isin.get_isin("A23RUXWKASG834LTMK28", return_dataframe=True)
>>> print(isin_list)
['SE0000382335',
'US052800AB59',
'US0528002084',
'US0528003074',
'US0528001094',
'US0528001177']
>>> print(dataframe)
| | LEI | ISIN |
|--------:|:---------------------|:-------------|
| 1858574 | A23RUXWKASG834LTMK28 | SE0000382335 |
| 2141681 | A23RUXWKASG834LTMK28 | US052800AB59 |
| 2990824 | A23RUXWKASG834LTMK28 | US0528002084 |
| 3450877 | A23RUXWKASG834LTMK28 | US0528003074 |
| 3766379 | A23RUXWKASG834LTMK28 | US0528001094 |
| 4442500 | A23RUXWKASG834LTMK28 | US0528001177 |
# ISIN TO LEI
>> isin_to_lei = ISINtoLEI()
>> lei_number = isin_to_lei.get_lei("US0528003074")
>> print(lei_number)
['A23RUXWKASG834LTMK28']
You can also search for possible LEI numbers for a given company name.
>>> from python_lei.lei_search import SearchLEI
>>> search_possible_lei = SearchLEI()
>>> raw_data, table = search_possible_lei.search_lei("Apple INC.", show_table=True)
>>> print(table)
+------------+----------------------+
| Legal Name | LEI |
+------------+----------------------+
| APPLE INC. | HWUPKR0MPOU8FGXBT394 |
+------------+----------------------+
>>> print(raw_data)
[{'LegalName': 'APPLE INC.', 'LEI': 'HWUPKR0MPOU8FGXBT394'}]
FAQs
Python wraper for Legal Entity Identification API and ISIN to LEI and vice versa conversion.
We found that python-lei demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
North Korean threat actors deploy 67 malicious npm packages using the newly discovered XORIndex malware loader.
Security News
Meet Socket at Black Hat & DEF CON 2025 for 1:1s, insider security talks at Allegiant Stadium, and a private dinner with top minds in software supply chain security.
Security News
CAI is a new open source AI framework that automates penetration testing tasks like scanning and exploitation up to 3,600× faster than humans.