
Security News
Another Round of TEA Protocol Spam Floods npm, But It’s Not a Worm
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.
sftpclient is a simple to use sftp client to connect to remote FTP servers over ssh (SFTP) using username/password combo.
Uploads and downloads work with file-handles by default so as to not fill up the working directory with downloaded files when the desire was just to read and parse the data available at the remote server.
Default downloads are in bytes mode mode=rb, use an io.TextIOWrapper to read the file as text.
Sample usage
from sftpclient import SFTPClient
# create client instance.
client = SFTPClient(
host=SFTPHOST,
username=YOURSFTPUSERNAME,
password=YOURSFTPPASSWORD,
use_known_hosts=UPTOYOUTODECIDE,
)
# Uploading files;
# 1. open a file (or use a `tempfile.TemporaryFile`).
with open('somefile') as file_to_upload:
# 2. use the `SFTPClient` `upload` method to pass the open file handle to
# the remote `destination`.
client.upload(file_to_upload, destination='/uploads')
# Downloading files;
file = client.download('/data/consume.txt', text=True)
# use `text=True` when downloading text files, default is `bytes` mode.
for line in file:
# continue with processing the file as desired, or just write it out to
# local disk.
FAQs
Username/Password SFTP Client
We found that sftpclient demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.

Security News
PyPI adds Trusted Publishing support for GitLab Self-Managed as adoption reaches 25% of uploads

Research
/Security News
A malicious Chrome extension posing as an Ethereum wallet steals seed phrases by encoding them into Sui transactions, enabling full wallet takeover.