
Security News
Another Round of TEA Protocol Spam Floods npm, But It’s Not a Worm
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.
This project provides a Python client for interacting with the Quokka API. The client allows users to perform various operations such as uploading files for scanning, retrieving scan results, downloading reports, and managing subgroups.
To install the Quokka API Client, use pip:
pip install quokkaio
First, import the Quokka class and create an instance with your API key:
from quokka import Quokka
api_key = "YOUR_API_KEY"
quokka = Quokka(api_key)
Upload an APK or IPA file for scanning:
the_file = "path/to/your/app.apk"
subgroup_ids = ["subgroup1", "subgroup2"]
response_data, platform = quokka.push_scan(the_file, subgroup_ids)
print(response_data, platform)
Retrieve a list of subgroups:
quokka.get_sub_groups()
Retrieve a specific subgroup ID by name:
subgroup_id = quokka.get_sub_groups(the_group="specific_group_name")
print(subgroup_id)
Wait for a scan to complete:
uuid = "scan_uuid"
quokka.wait_for_scan_complete(uuid, maxWaitTime=30) # maxWaitTime in minutes
Download the scan results as a PDF file:
uuid = "scan_uuid"
quokka.download_pdf(uuid)
Retrieve app issues in JSON format:
uuid = "scan_uuid"
issues = quokka.get_app_issue(uuid)
print(issues)
Retrieve specified results in JSON format from a start date:
from datetime import datetime
start_date = datetime(2023, 1, 1)
results = quokka.get_results(start_date)
print(results)
Retrieve submitted apps within a date range:
from datetime import datetime
start_date = datetime(2023, 1, 1)
end_date = datetime(2023, 6, 1)
apps = quokka.get_apps(start_date, end_date)
print(apps)
Retrieve the Group User data in either CSV or compressed file format:
is_compressed = 'false'
quokka.get_users(isCompressed=is_compressed)
isCompressed is optional and defaults to falses
Request the Audit Log CSV which will be processed in the background. Users can request that the file is sent as either a CSV or as a compressed file. The request also allows users to select a specific date range for the audit log data. When the file is ready, the requesting user will receive an email with a download link.
start_date = "2023-01-01"
end_date = "2023-06-01"
is_compressed = 'false'
result = quokka.get_auditLogs(startDate=start_date, endDate=end_date, isCompressed=is_compressed)
This client uses Python's built-in logging module to provide debug information. By default, logging is set to the DEBUG level. You can configure the logging level and format as needed.
If you want to contribute to this project, please fork the repository and create a pull request with your changes. Make sure to write tests and documentation for new features or modifications.
This project is licensed under the Apache-2.0 License. See the LICENSE file for details.
FAQs
API wrapper for the Quokka security software
We found that quokkaio demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.

Security News
PyPI adds Trusted Publishing support for GitLab Self-Managed as adoption reaches 25% of uploads

Research
/Security News
A malicious Chrome extension posing as an Ethereum wallet steals seed phrases by encoding them into Sui transactions, enabling full wallet takeover.