
Security News
Engineering with AI Podcast: The Promise of AI-First Development
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.
types-cryptography
Advanced tools
This is a PEP 561 type stub package for the cryptography package.
It can be used by type-checking tools like mypy, PyCharm, pytype etc. to check code
that uses cryptography. The source for this package can be found at
https://github.com/python/typeshed/tree/main/stubs/cryptography. All fixes for
types and metadata should be contributed there.
Note: The cryptography package includes type annotations or type stubs
since version 3.4.4. Please uninstall the types-cryptography
package if you use this or a newer version.
See https://github.com/python/typeshed/blob/main/README.md for more details.
This package was generated from typeshed commit c0e9038f0d71a38efc672ac5ef11aae0292c0a96.
FAQs
Typing stubs for cryptography
We found that types-cryptography demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.

Research
Fake “Phantom Shuttle” VPN Chrome extensions (active since 2017) hijack proxy auth to intercept traffic and continuously exfiltrate user credentials to attacker infrastructure.