Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
TREXIO provides a Python API, which enables interactive calls to the library. It facilitates the development of interfaces between different codes and can be used to convert data from one input/output file format into another.
In short, you can run the following command:
pip install trexio
However, it is good practice to first check for updates of the build-system packages. This can be achieved by running
python -m pip install --upgrade pip setuptools build wheel
Note: we highly recommend to use virtual environments to avoid compatibility issues and to improve reproducibility. For more details, see the corresponding part of the Python documentation.
trexio-<version>.tar.gz
file with the latest Python APIgzip -cd trexio-<version>.tar.gz | tar xvf -
cd trexio-<version>
pip install -r requirements.txt
(this installs all required python dependencies)/path/to/hdf5/
with your paths.
The following two steps can be skipped if HDF5 is properly configured for pkg-config
(i.e. if executing pkg-config --libs hdf5
returns a list of options).
export H5_CFLAGS=-I/path/to/hdf5/include
export H5_LDFLAGS=-L/path/to/hdf5/lib
On MacOS where HDF5 is installed with homebrew (i.e. brew install hdf5
), one can use the following:export H5_CFLAGS="-I$(brew --prefix hdf5)/include"
export H5_LDFLAGS="-L$(brew --prefix hdf5)/lib"
pip install .
(this installs trexio
in your environment)cd test && python -m pytest -v test_api.py
(this executes several tests that verify the installation)You are ready to go!
Note:
installation based on pip
compiles its own C extension (shared library) called pytrexio
.
This extension is built from the TREXIO source files coupled to the wrapper code generated by SWIG.
The compiler options during this installation may differ from the ones used to compile the primary TREXIO API in C.
Furthermore, custom compiler flags provided to ./configure
or make
are not applied to the Python API.
An interactive Jupyter notebook called tutorial_benzene.ipynb
is provided in the examples
directory.
The notebook can be lauched either locally (see next section for details) or using pre-built environment on Binder.
Jupyter can be installed using pip install jupyter
. If you are not familiar with it, feel free to consult the Jupyter documentation.
The example notebook can be launched using the following command:
jupyter notebook tutorial_benzene.ipynb
In some cases, it may happen that the Jupyter kernels in the activated virtual environment (e.g. myvenv
) still point to the system-wide python binaries and not to the environment ones.
This will result in ImportError
when importing trexio
in the notebook cell. In order to avoid this, the myvenv
has to be installed as an additional kernel.
This requires ipykernel
python package, which usually comes together with the Jupyter installation. If this is not the case, run pip install ipykernel
.
You can install myvenv
as a kernel by executing the following command:
python3 -m ipykernel install --user --name=myvenv
Now you can launch a Jupyter notebook. Once it is open, make sure that your virtual environment is selected as the current kernel. If this is not the case, try this:
Kernel
button in the navigation panelChange kernel
myvenv
) in the list and select itThat's it, you have activated the custom virtual environment called myvenv
in your notebook.
To uninstall the kernel named myvenv
, execute the following command:
jupyter kernelspec uninstall myvenv
FAQs
Python API of the TREXIO library
We found that trexio demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.