dangerzone
pattern-matching-in-python
dangerzone | pattern-matching-in-python | |
---|---|---|
21 | 3 | |
3,199 | 6 | |
6.6% | - | |
9.6 | 1.8 | |
6 days ago | almost 3 years ago | |
Python | Python | |
GNU Affero General Public License v3.0 | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
dangerzone
-
Dangerzone: Convert PDFs, documents, or images to a safe PDF
I don't have experience with Qubes in order to know what the files do, but this repo references two files in a qubes directory: e.g. https://github.com/freedomofpress/dangerzone/blob/v0.6.0/qub...
- dangerzone: Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs
-
Ask HN: How can I security-sandbox email attachment opening?
start here: https://github.com/freedomofpress/dangerzone
i've never used it, but i've been meaning to check it out. at least it should give you a jumping off point for further investigation.
if that is insufficient, use proofpoint.
for archives that are tickling bugs, you have to use a similar technique. it's not enough to analyze them and send them on as-is. you have to unpack in a sandbox (which will be detectable, no 2 ways about it, but the question is will anyone expend enough effort to detect -- no, not for your use case, seeing as how you're asking the question at all), process with dangerzone or dangerzone-like tool, then re-archive it and let the user see only that new archive.
-
Ask HN: Why not cloud instead of Qubes “trusted PDFs” or Dangerzone?
I've read about the concept of "trusted PDFs" [1] from Qubes OS and the Dangerzone project [2].
I noticed people saying they use such tools to open applicant attachments in the context of employee hiring processes.
Isn't it simpler to just open these untrusted files in a cloud service like Google Drive or Microsoft Office online?
[1] https://blog.invisiblethings.org/2013/02/21/converting-untrusted-pdfs-into-trusted.html
[2] https://github.com/freedomofpress/dangerzone
-
QubesOS – A reasonably secure operating system
You can use something similar on macOS, Windows or Linux, based on Docker containers, see Dangerzone: https://github.com/freedomofpress/dangerzone
-
Help an independant journalist survive :)
https://github.com/freedomofpress/dangerzone has been a great tool to use as an added layer of defense. Definitely check out this users other projects as you can tell by the users name that they are made for journalists.
-
Downloading pdf’s & Javascript
This is exactly what DangerZone is built for. Takes ‘dangerous’ PDFs, converts them to images and back (via OCR) so there’s nothing potentially harmful inside. Does all the conversion inside docker containers so there’s little chance of a sandbox escape or network access
-
How can I implement this open-source tool as an API?
The source code for the CLI application is probably the best place to look for an example of how to use the internal parts of the code which perform the actual conversion: https://github.com/freedomofpress/dangerzone/blob/main/dangerzone/cli.py
-
Secure PDF Viewer app version 16 released
Check out danger zone - https://github.com/freedomofpress/dangerzone
pattern-matching-in-python
-
Looking for explanation of Inferred variables in match and loops. Maybe other places
This explains pattern matching in Python, but hopefully it'll help. The foundation is the same.
-
I think the CTX package on PyPI has been hacked!
Here's the link to the English version for those, like me, who cannot read Spanish!
What are some alternatives?
PdfViewer - Simple Android PDF viewer based on pdf.js and content providers. The app doesn't require any permissions. The PDF stream is fed into the sandboxed WebView without giving it access to content or files. CSP is used to enforce that the JavaScript and styling properties within the WebView are entirely static.
safety - Safety checks Python dependencies for known security vulnerabilities and suggests the proper remediations for vulnerabilities detected.
ctx - A minimal but opinionated dict/object combo (like Bunch).
bandit - Bandit is a tool designed to find common security issues in Python code.
kad - A simple Python package converting dictionary keys to attributes of a class.
Contents - Community documentation, code, links to third-party resources, ... See the issues and pull requests for pending content. Contributions are welcome !
pip-audit - Audits Python environments, requirements files and dependency trees for known security vulnerabilities, and can automatically fix them
CPython - The Python programming language
warehouse - The Python Package Index