masto.es es uno de los varios servidores independientes de Mastodon que puedes usar para participar en el fediverso.
Bienvenidos a masto.es, el mayor servidor de Mastodon para hispanohablantes de temática general.

Administrado por:

Estadísticas del servidor:

1,9 K
usuarios activos

#pypi

1 publicación1 participante1 publicación hoy
Some Bits: Nelson's Linkblog<p>pyx for Python: Company is starting a commercial package repository as an alternative to PyPI<br><a href="https://simonwillison.net/2025/Aug/13/pyx/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">simonwillison.net/2025/Aug/13/</span><span class="invisible">pyx/</span></a><br> <a href="https://tech.lgbt/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a> <a href="https://tech.lgbt/tags/astral" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>astral</span></a> <a href="https://tech.lgbt/tags/pypi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pypi</span></a> <a href="https://tech.lgbt/tags/pyx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pyx</span></a> <a href="https://tech.lgbt/tags/vc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vc</span></a> <a href="https://tech.lgbt/tags/uv" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uv</span></a> #+</p>
Mike Fiedler, Code Gardener<p>Incident Report of the recent <a href="https://hachyderm.io/tags/PyPI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PyPI</span></a> Phishing Campaign</p><p>TL,DR:<br>• PyPI was not breached<br>• PyPI users were targeted with phishing emails<br>• A single project saw uploads with malicious code and those releases have been removed</p><p><a href="https://blog.pypi.org/posts/2025-07-31-incident-report-phishing-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.pypi.org/posts/2025-07-31</span><span class="invisible">-incident-report-phishing-attack/</span></a></p><p><a href="https://hachyderm.io/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://hachyderm.io/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://hachyderm.io/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a></p>
The New Oil<p>Hackers target <a href="https://mastodon.thenewoil.org/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> devs in <a href="https://mastodon.thenewoil.org/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> attacks using fake <a href="https://mastodon.thenewoil.org/tags/PyPI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PyPI</span></a> site</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-target-python-devs-in-phishing-attacks-using-fake-pypi-site/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hackers-target-python-devs-in-phishing-attacks-using-fake-pypi-site/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
⚯ Michel de Cryptadamus ⚯<p>Just released version 1.16.8 of The Pdfalyzer with a bunch of new and updated <a href="https://universeodon.com/tags/YARA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YARA</span></a> rules to scan <a href="https://universeodon.com/tags/PDF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PDF</span></a> files for malicious content. Links in the quoted toot below.</p><p><a href="https://universeodon.com/@cryptadamist/114768170683991686" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">universeodon.com/@cryptadamist</span><span class="invisible">/114768170683991686</span></a></p><p><a href="https://universeodon.com/tags/ascii" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ascii</span></a> <a href="https://universeodon.com/tags/asciiArt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>asciiArt</span></a> <a href="https://universeodon.com/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://universeodon.com/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://universeodon.com/tags/detectionEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>detectionEngineering</span></a> <a href="https://universeodon.com/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://universeodon.com/tags/forensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>forensics</span></a> <a href="https://universeodon.com/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://universeodon.com/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://universeodon.com/tags/homebrew" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homebrew</span></a> <a href="https://universeodon.com/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://universeodon.com/tags/KaliLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KaliLinux</span></a> <a href="https://universeodon.com/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://universeodon.com/tags/malwareDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareDetection</span></a> <a href="https://universeodon.com/tags/malwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareAnalysis</span></a> <a href="https://universeodon.com/tags/openSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSource</span></a> <a href="https://universeodon.com/tags/pdf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pdf</span></a> <a href="https://universeodon.com/tags/pdfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pdfs</span></a> <a href="https://universeodon.com/tags/pdfalyzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pdfalyzer</span></a> <a href="https://universeodon.com/tags/pypi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pypi</span></a> <a href="https://universeodon.com/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a> <a href="https://universeodon.com/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://universeodon.com/tags/reverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseEngineering</span></a> <a href="https://universeodon.com/tags/reversing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reversing</span></a> <a href="https://universeodon.com/tags/Threatassessment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Threatassessment</span></a> <a href="https://universeodon.com/tags/threathunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threathunting</span></a> <a href="https://universeodon.com/tags/yaralyze" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yaralyze</span></a> <a href="https://universeodon.com/tags/yaralyzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yaralyzer</span></a> <a href="https://universeodon.com/tags/YARA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YARA</span></a> <a href="https://universeodon.com/tags/YARArule" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YARArule</span></a> <a href="https://universeodon.com/tags/YARArules" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YARArules</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/PyPI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PyPI</span></a> maintainers alert users to email verification <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> attack<br><a href="https://securityaffairs.com/180585/hacking/pypi-maintainers-alert-users-to-email-verification-phishing-attack.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180585/hac</span><span class="invisible">king/pypi-maintainers-alert-users-to-email-verification-phishing-attack.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/PyPI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PyPI</span></a> maintainers alert users to email verification <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> attack<br><a href="https://securityaffairs.com/180585/hacking/pypi-maintainers-alert-users-to-email-verification-phishing-attack.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180585/hac</span><span class="invisible">king/pypi-maintainers-alert-users-to-email-verification-phishing-attack.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
TechnoTenshi :verified_trans: :Fire_Lesbian:<p>Popular Python package <code>num2words</code> v0.5.15 was flagged as compromised after being published without a GitHub tag. Linked to the "Scavenger" threat actor, it was quickly removed from PyPI. Projects using automated tools may have already pulled the malicious version. Check and downgrade if needed. </p><p><a href="https://www.stepsecurity.io/blog/supply-chain-security-alert-num2words-pypi-package-shows-signs-of-compromise" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">stepsecurity.io/blog/supply-ch</span><span class="invisible">ain-security-alert-num2words-pypi-package-shows-signs-of-compromise</span></a></p><p><a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://infosec.exchange/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://infosec.exchange/tags/PyPI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PyPI</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
Seth Larson<p>🚨 Be aware there's a potential phishing campaign likely targeting <a href="https://mastodon.social/tags/PyPI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PyPI</span></a> / <a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> package maintainers:</p><p><a href="https://discuss.python.org/t/phishing-attack/100267" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discuss.python.org/t/phishing-</span><span class="invisible">attack/100267</span></a></p>
bignose<p>I just received a <a href="https://fosstodon.org/tags/Scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scam</span></a> email from a <a href="https://fosstodon.org/tags/TypoSquatter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TypoSquatter</span></a>. Sender: noreply@pypj.org</p><p>They're hoping I don't notice the typo for <a href="https://fosstodon.org/tags/PyPI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PyPI</span></a> (the <a href="https://fosstodon.org/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> package index), and asking me to “follow this link to verify your email address”.</p><p>Don't follow the link, just mark the message as spam and delete it.</p><p>Be careful out there.</p>
Jason Weatherly<p>After some refactoring, learning about `hatch`, moving more files around, and generally abusing `test.pypi.org`: I've uploaded `diceparse` to PyPI. Still need to update the web documentation, but it now feels like a proper project at this point.</p><p>I still need to add a CLI part so you can just roll dice after installing the package, but I'll handle that later. Also need to tweak the README.md a bit as well...</p><p><a href="https://social.linux.pizza/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a> <a href="https://social.linux.pizza/tags/diceparse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>diceparse</span></a> <a href="https://social.linux.pizza/tags/dice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dice</span></a> <a href="https://social.linux.pizza/tags/ttrpg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ttrpg</span></a> <a href="https://social.linux.pizza/tags/pypi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pypi</span></a></p>

I was annoyed that there is no "expand_grid()" function in :python: #Python as in :rstats: #RStats #tidyverse

So I just published a small package on #PyPI !

Introducing polarsgrid
pypi.org/project/polarsgrid/

Using the excellent #polars 🐻‍❄️ package, easily create a table with product of factors:

from polarsgrid import expand_grid
expand_grid(a=[1, 2, 3], b=["x", "y"])

Yields all combinations of its inputs as a #DataFrame

It can also produce a #LazyFrame for streaming extra-big tables to disk

pypi.orgClient Challenge

Just published version 1.16.6 of The Pdfalyzer, the surprisingly popular tool for analyzing (possibly malicious) PDFs I created after my own unpleasant encounter with such a creature. Includes a (kind of janky) #YARA rule for #GIFTEDCROOK infostealer PDFs.

* Github: github.com/michelcrypt4d4mus/p
* Pypi: pypi.org/project/pdfalyzer/
* Homebrew: formulae.brew.sh/formula/pdfal

#pypi#python#pdf

PyPI Malware Exploits Instagram Growth Tools to Harvest Credentials

Pulse ID: 68496f698c9d93ca338f0790
Pulse Link: otx.alienvault.com/pulse/68496
Pulse Author: cryptocti
Created: 2025-06-11 11:58:33

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

PyPI Supply Chain Attack Uncovered: Colorama and Colorizr Name Confusion

A malicious package campaign targeting Python and NPM users on Windows and Linux has been discovered. The attack uses typo-squatting and name-confusion tactics against the popular colorama Python package and the similar colorizr JavaScript package. Multiple packages with risky payloads were uploaded to PyPI, using names similar to legitimate packages in both PyPI and NPM. The unusual tactic of using an NPM package name to attack PyPI users was observed. The payloads allow remote access, control of desktops and servers, and exfiltration of sensitive data. Windows payloads attempt to bypass antivirus protection. The campaign's sophistication suggests targeted adversarial activity, although attribution remains unclear.

Pulse ID: 683e1f7f063d60138cc2ccf6
Pulse Link: otx.alienvault.com/pulse/683e1
Pulse Author: AlienVault
Created: 2025-06-02 22:02:39

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
Respondió en el hilo

@brunopostle I don't know about the relevance of #gbXML , beside it being used by #energyplus / #OpenStudio . From the thesis of MGVisschers, I get the impression that the format is supposed by all building energy simulation software. And I've seen there is already a well developed gbxml package on #pypi . To me, it seems obvious there should be a developed package for conversion between #IFC and gbxml.