An un-audited security tool to encrypt Python code.
Project description
Tool to encrypt local Python source code with AES-256, and dynamically load and run it, and bring it into the Lockdown namespace. Uses HMAC for integrity check, AES-256 in counter mode for encryption.
THIS HAS NOT BEEN AUDITED FOR SECURITY HOLES. USE AT OWN RISK. I’M NOT RESPONSIBLE FOR YOUR FAILURE TO HEED THAT WARNING.
Example usage:
#!/bin/bash lockdown lockedfiles.vault secret/creds.py secret/my_funcs.py # Enter and repeat password. # Now would be a good time to delete the files you locked, # but make sure not to lose that vault file.
In Python:
#!/usr/bin/env python from lockdown import Lockdown locker = Lockdown('lockedfiles.vault') # Enter password. locker.unlock() # Login with encrypted credentials. Python files aren't there! # Note: It collapsed the path. # (so it's locker.creds, not locker.secret.creds) some_login(locker.creds.USERNAME, locker.creds.PASSWORD) # Call a function. # NOTE: These can't import vaulted files within functions. # Files are lost after unlocking! locker.my_funcs.scoobydoo() # To leave files out, do this instead: locker.unlock(delete=False)
You can see the potential uses, for example locking up a file with secret keys and credentials with a master password, or disabling functionality of a script and not exposing the source unless the password is available.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file lockdown-0.4.1.tar.gz
.
File metadata
- Download URL: lockdown-0.4.1.tar.gz
- Upload date:
- Size: 4.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | b92b95a637c940c3d9d04b25974519da19c6a5b60c2d82d8f80658d04a0d8f94 |
|
MD5 | 3d096df680457e2525a06ebc14bb1f02 |
|
BLAKE2b-256 | be1dd31db43e5dbe998570d949655c01687d19f0fcfac2ea3c94b6144452d597 |