rOpenSci | Security

Security

Secure Your Data and Workflow
Showing 10 of 12

Secure Shell (SSH) Client for R

Jeroen Ooms
Description

Connect to a remote server over SSH to transfer files via SCP, setup a secure tunnel, or run a command or script on the host while streaming stdout and stderr directly to the client.

View Documentation
ropsec

Personal Workstation Safety Check

Ildiko Czeller
Description

Sobriety checkpoints are designed to help ensure personal and public safety. Methods are provided to run “sobriety” checks on your system to ensure your computing environment is as safe as possible from the perspectives of confidentiality and integrity.

View Documentation

High Level Encryption Wrappers

Rich FitzJohn
Description

Encryption wrappers, using low-level support from sodium and openssl. cyphr tries to smooth over some pain points when using encryption within applications and data analysis by wrapping around differences in function names and arguments in different encryption providing packages. It also provides high-level wrappers for input/output functions for seamlessly adding encryption to existing analyses.

View Documentation
defender

Check Package for Potential Security Violations

Ildiko Czeller
Description

Check an R package for potential security risks and violations via static code analysis.

View Documentation
middlechild

Tools to Intercept, Validate and Consume Web/Network Traffic

Ildiko Czeller
Description

The mitmproxy https://mitmproxy.org/ project provides tools to intercept, modify and/or introspect network traffic. Methods are provided to download, install, configure and launch mitmproxy plus introspect and validate network captures.

View Documentation
testevil

Intuit Package Harm

Ildiko Czeller
Description

Intuit package harm.

View Documentation
keybase

Tools to Work with the Keybase API

Ildiko Czeller
Description

Keybase <keybase.io> is a directory of people and public keys and provides methods for obtaining public keys, validating users and exchanging files and/or messages in a secure fashion. Tools are provided to search for and retrieve information about Keybase users, retrieve and import user public keys and list and/or download files. There’s also a thin but useful R wrapper around many of they keybase command-line utility functions.

View Documentation
notary

Signing and Verification of R Packages

Bob Rudis
Description

Signing and verification of R packages.

View Documentation