
Research
SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains
An emerging npm supply chain attack that infects repos, steals CI secrets, and targets developer AI toolchains for further compromise.
winfspy
Advanced tools
.. image:: https://github.com/scille/winfspy/actions/workflows/ci.yml/badge.svg :target: https://github.com/scille/winfspy/actions/workflows/ci.yml :alt: GitHub Actions Status
.. image:: https://codecov.io/gh/Scille/winfspy/branch/master/graph/badge.svg :target: https://codecov.io/gh/Scille/winfspy
.. image:: https://img.shields.io/pypi/v/winfspy.svg :target: https://pypi.python.org/pypi/winfspy :alt: Pypi Status
.. image:: https://img.shields.io/badge/code%20style-black-000000.svg :target: https://github.com/ambv/black :alt: Code style: black
Bindings for WinFSP <http://www.secfs.net/winfsp/>_ version 1.4 and onward.
Winfspy consists of three important modules:
winfspy: expose the WinFSP APIwinfspy.memfs: a memory file system based on winfspywinfspy.tests.winfsp_tests: a test suite for black box testingwinfspy.tests.winfstest: a lighter test suite for black box testingWinFSP <http://www.secfs.net/winfsp/>_ version 1.4 or higher has to be installed separately.
Then install winfspy using pip::
$ pip install winfspy
Usage::
from winfspy import (
FileSystem,
BaseFileSystemOperations,
enable_debug_log,
FILE_ATTRIBUTE,
CREATE_FILE_CREATE_OPTIONS,
NTStatusObjectNameNotFound,
NTStatusDirectoryNotEmpty,
NTStatusNotADirectory,
NTStatusObjectNameCollision,
NTStatusAccessDenied,
NTStatusEndOfFile,
)
Usage::
# Run the memory fs as X: drive in verbose mode
$ python -m winfspy.memfs X: -v
# More information
$ python -m winfspy.memfs
This test suite integrates the external test suite of
winfsp-tests <https://github.com/billziss-gh/winfsp/tree/master/tst/winfsp-tests>_.
Usage::
# Install winfspy with the test dependencies
$ pip install winfspy[test]
# Run the winfstest test suite on an existing X: drive
$ python winfspy.tests.winfsp_tests --file-system-path X:
# More information about pytest
$ python winfspy.tests.winfsp_tests -h
This test suite is taken from
secfs.test.winfstest <https://bitbucket.org/billziss/secfs.test/>_.
It is basic yet useful to test common use cases.
Usage::
# Install winfspy with the test dependencies
$ pip install winfspy[test]
# Run the winfstest test suite on an existing X: drive
$ python winfspy.tests.winfstest --file-system-path X:
# More information about pytest
$ python winfspy.tests.winfstest -h
Free software: BSD
FAQs
CFFI bindings for WinFSP
We found that winfspy demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
An emerging npm supply chain attack that infects repos, steals CI secrets, and targets developer AI toolchains for further compromise.

Company News
Socket is proud to join the OpenJS Foundation as a Silver Member, deepening our commitment to the long-term health and security of the JavaScript ecosystem.

Security News
npm now links to Socket's security analysis on every package page. Here's what you'll find when you click through.