An obfuscator for python packages.
Project description
package-obfuscator
Disclaimer
This package was developed as part of the SocialNetworkHarvester by the Freezingdata GmbH. We found the obfuscation of packages to be essential for our work so we developed this package. The package will be maintained as long as we need the functionality for our own software. We do not and cannot guarantee long-term maintenance, nor can be guarantee support in issues. We will nevertheless try to answer all incoming questions in a timely manner. If you want to contribute feel free to create a merge request and open an issue discussing a potential bug or feature. You are free to use this software in any personal or commercial project.
Quick-Start
To install the package-obfuscator run the following command:
pip install package-obfuscator
To use the package-obfuscator either use the cli...
package-obfuscate my_secret_package
or use the package-obfuscator in a script:
import os
import package_obfuscator
current_folder = os.path.dirname(os.path.realpath(__file__))
package_folder = os.path.join(current_folder, 'my_secret_package')
package_obfuscator.obfuscate(package_folder)
CLI
The CLI provides the following options
Argument | Description | Default |
---|---|---|
package_location (positional) |
An absolute or relative path to the package that should be obfuscated | required |
--output / -o |
An absolute or relative path to a folder in which to place the obfuscated package content. If this argument is not provided the obfuscation will take place in the originally provided package_location . |
package_location |
--force-overwrite / -f |
If the output folder is existent the obfuscator will exit. You can disable this behaviour and achieve a hard overwrite if you add this option | |
--short-filenames / -s |
By adding this option, shorter filenames will be generated for the obfuscated files by avoiding the default random uuid in filenames. | |
--py-cache-folder-name / -p |
Provide a custom filename for the pycache generated folder. |
Python API
package_obfuscator
package_obfuscator.obfuscate(package_dir, [output=..., [force_output_overwrite=False]])
Argument | Description | Required / Optional |
---|---|---|
package_dir |
The absolute or relative path to the package directory. | Required |
output |
The absolute or relative path to the directory in which to place the obfuscated files. If not provided the obfuscation will take place within the package_dir . |
Optional |
force_output_overwrite |
If the output folder exists when running the code the obfuscator will exit with an exception. If you want to force an overwrite you should provide this argument with True . |
Optional |
short_filenames |
By adding this option, shorter filenames will be generated for the obfuscated files by avoiding the default random uuid in filenames. | Optional |
py_cache_folder_name |
Provide a custom filename for the pycache generated folder. | Optional |
When to use the package-obfuscator
The package-obfuscator
should be used prior to releasing your python package in any way. The easiest way is to use the following code structure. Let's assume you are developing a module called my_module
. Your directory structure will look something like this:
my-module-repository
> my_module_source
> sub_module
script2.py
__init__.py
script1.py
setup.py
Then it is suggested to use the package-obfuscator
as a package in the setup.py
.
import package_obfuscator
package_obfuscator.obfuscate('my_module_source', output='my_module')
setup(
name='my_module',
version='0.0.1',
packages=find_packages(include=['my_module', 'my_module.*'])
)
Your wheel will then only include obfuscated code.
How does the obfuscation work?
The obfuscation works by compiling the code within each package-related python file into binary code. It will find all python files (*.py
) recursively and ignore all other files. The binary code is then saved into separate files. The original file will execute the binary file using the exec
command and the marshal
library.
How safe is the obfuscation method?
It is important to note that the obfuscation is not completely secure. It is possible to reverse-engineer your code using the binary files. But even when converting the code back only excerpts of the code will be humanly readable straight away. This method of obfuscation is recommended for code that is not mission-critical but should nevertheless not be deployed as human-readable code.
Test
docker build --rm -t test .
docker run --rm -t -v $(pwd):/root/${PWD##*/} test bash test.sh
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file package_obfuscator-1.0.2.tar.gz
.
File metadata
- Download URL: package_obfuscator-1.0.2.tar.gz
- Upload date:
- Size: 7.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.12.4
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | ed207a6894821c967e297e0c308cad8d16f6a7f94c8820c1e4bfb899d618aa2f |
|
MD5 | 32be513b77c92cce526320225421b65e |
|
BLAKE2b-256 | b1f2ff2e7b234b9866e1f98fdeb04373fae2d04f09d99c6187ca5c0a78633573 |
File details
Details for the file package_obfuscator-1.0.2-py3-none-any.whl
.
File metadata
- Download URL: package_obfuscator-1.0.2-py3-none-any.whl
- Upload date:
- Size: 8.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.12.4
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | b416c75c768153f5de99e860d12bf428e823d520773ac40e2bb13d72c8b75feb |
|
MD5 | 173b949c8e99faa99fca74adf2d21d53 |
|
BLAKE2b-256 | 68002236e09eab22a11dea00987e47231d1ba0d9189b60cd0f6a131165fd3882 |