Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
sheraf is a wrapper library around ZODB that provides models management and indexation. It aims to make the use of ZODB
simple by providing ready-to-use tools and explicit tools. sheraf is currently compatible with ZODB 5
and python 3.7+
.
You can expect sheraf to:
sheraf is compatible with Python 3.7+
poetry add sheraf
# or
pip install sheraf
If you need pytest fixtures for your project check out pytest-sheraf. There are also sheraf fixtures for unittest.
pip install pytest-sheraf
Bug reports and pull requests are highly encouraged!
poetry run pytest
and poetry run tox
black
poetry run tox -e doc
You can build it with the following commands, or read it on readthedocs.
poetry run tox -e doc
open build/sphinx/html/index.html
sheraf use poetry as its main build tool. Do not hesitate to check the documentation.
poetry install --extras all
FAQs
Versatile ZODB abstraction layer
We found that sheraf demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.