Skip to main content

Classes for safely handling secrets

Project description

Omniblack Secret

Classes for safer handling of secrets. We use libsodium to store secrets in memory that is protected by guard pages, a canary, and is set to readonly when the library is not reading from it. These protections should help mitigate exploits in other parts of the program allow for arbitrary reads of memory, and should reduce the risk of buffer overflows and similar memory writing bugs from corrupting the secret.

Further more Secret instance's repr will not reveal the secret so if a secret object is accidentally logged the secret value will not be exposed, and the value is stored in a C slot not in a python dict or slot so introspection tools like rich.inspect will not reveal the secret.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

omniblack_secret-0.0.14.tar.gz (9.2 kB view details)

Uploaded Source

File details

Details for the file omniblack_secret-0.0.14.tar.gz.

File metadata

  • Download URL: omniblack_secret-0.0.14.tar.gz
  • Upload date:
  • Size: 9.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for omniblack_secret-0.0.14.tar.gz
Algorithm Hash digest
SHA256 dd88bb917db74c4d49958dc2fc370c4db28a4ec17c459414e2a4f60f7dba6fb9
MD5 86af3a1a90ae0c2be98f8193ecffd45c
BLAKE2b-256 9ac6abdd9e6c5dcbf72b422f715e5434cbb861cf102a3023581319129c6911e4

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page