
Product
Rubygems Ecosystem Support Now Generally Available
Socket's Rubygems ecosystem support is moving from beta to GA, featuring enhanced security scanning to detect supply chain threats beyond traditional CVEs in your Ruby dependencies.
types-dj-database-url
Advanced tools
This is a PEP 561 type stub package for the dj-database-url
package. It
can be used by type-checking tools like
mypy,
pyright,
pytype,
PyCharm, etc. to check code that uses
dj-database-url
. The source for this package can be found at
https://github.com/python/typeshed/tree/main/stubs/dj-database-url. All fixes for
types and metadata should be contributed there.
Note: The dj-database-url
package includes type annotations or type stubs
since version 2.0.0. Please uninstall the types-dj-database-url
package if you use this or a newer version.
See https://github.com/python/typeshed/blob/main/README.md for more details.
This package was generated from typeshed commit afe18e95a9592434e93b648de5194cfe54443f84
and was tested
with mypy 1.4.1, pyright 1.1.318, and
pytype 2023.6.16.
FAQs
Typing stubs for dj-database-url
We found that types-dj-database-url demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket's Rubygems ecosystem support is moving from beta to GA, featuring enhanced security scanning to detect supply chain threats beyond traditional CVEs in your Ruby dependencies.
Research
The Socket Research Team investigates a malicious npm package that appears to be an Advcash integration but triggers a reverse shell during payment success, targeting servers handling transactions.
Security Fundamentals
The Socket Threat Research Team uncovers how threat actors weaponize shell techniques across npm, PyPI, and Go ecosystems to maintain persistence and exfiltrate data.