Skip to main content

CryptoServe Auto-Protect - Automatic encryption for third-party libraries

Project description

cryptoserve-auto

Automatic encryption for data flowing through third-party libraries.

The Problem

Your application uses hundreds of dependencies. Each may send sensitive data to external services. When quantum computing breaks classical encryption, these dependencies become attack vectors.

The Solution

One line of code automatically protects all outbound sensitive data:

import cryptoserve_auto
cryptoserve_auto.protect()

# Now all outbound requests are automatically protected
import requests
requests.post("https://api.vendor.com/users", json={
    "name": "John Doe",
    "email": "john@example.com",  # Auto-encrypted
    "ssn": "123-45-6789",         # Auto-encrypted
})

Installation

pip install cryptoserve-auto

How It Works

  1. Intercepts outbound calls from popular libraries (requests, httpx, boto3)
  2. Detects sensitive fields using patterns and field names
  3. Encrypts data with quantum-ready algorithms before transmission
  4. Logs all protected data flows for audit visibility

Configuration

import cryptoserve_auto

cryptoserve_auto.protect(
    # What to protect
    libraries=["requests", "httpx"],  # Default: all supported
    patterns=["pii", "financial"],     # Default: all patterns

    # How to protect
    encryption_key=key,                # Required: your encryption key
    mode="encrypt",                    # "encrypt" | "tokenize" | "log_only"

    # Behavior
    fail_open=True,                    # On error: pass through (True) or block (False)
    async_logging=True,                # Non-blocking audit logging
)

Supported Libraries

Library What's Protected
requests POST/PUT/PATCH body data
httpx POST/PUT/PATCH body data
urllib3 Request bodies

More coming: boto3, stripe, psycopg2, sqlalchemy, redis

Sensitive Field Detection

Automatic patterns:

  • SSN: XXX-XX-XXXX
  • Credit cards: XXXX-XXXX-XXXX-XXXX
  • Emails: user@domain.com
  • Phone numbers

Field name detection:

  • ssn, social_security, tax_id
  • email, phone, address
  • password, secret, api_key
  • credit_card, card_number

Custom patterns:

cryptoserve_auto.protect(
    custom_patterns={
        "employee_id": r"EMP-\d{6}",
    },
    custom_fields=["internal_id"],
)

Escape Hatch

# Temporarily disable protection
with cryptoserve_auto.unprotected():
    requests.post(url, json=data)  # Not intercepted

Audit Logging

All protected data flows are logged:

{
  "timestamp": "2025-12-29T10:30:00Z",
  "library": "requests",
  "destination": "api.vendor.com",
  "fields_protected": ["email", "ssn"],
  "algorithm": "AES-256-GCM"
}

Performance

Operation Overhead
Field detection ~5μs per field
Encryption ~50μs per KB
Total request overhead <1ms

License

Apache 2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cryptoserve_auto-0.2.0.tar.gz (14.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

cryptoserve_auto-0.2.0-py3-none-any.whl (14.4 kB view details)

Uploaded Python 3

File details

Details for the file cryptoserve_auto-0.2.0.tar.gz.

File metadata

  • Download URL: cryptoserve_auto-0.2.0.tar.gz
  • Upload date:
  • Size: 14.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for cryptoserve_auto-0.2.0.tar.gz
Algorithm Hash digest
SHA256 40a36e31219e646d926c544bbfdf3519c226eaaba1ffd157a449faef0b5cb722
MD5 77b2b9a7476fc50a9e9e1a905ef921d2
BLAKE2b-256 ed1ebed69aad7b2fc7a653350a1fa8c263e48c75dde902c0aae0c9ef89f32b82

See more details on using hashes here.

File details

Details for the file cryptoserve_auto-0.2.0-py3-none-any.whl.

File metadata

File hashes

Hashes for cryptoserve_auto-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 5bdf54e75043937d5d51b190d665c0cb11e6246935ccb3d52d02adb01c0d81f3
MD5 82655f0faa7ff960cbfb46d699b05769
BLAKE2b-256 7438b6b910ac6c236bb4f113787fb4287ce18300f421c8e9043d027ffef93db4

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page