| Vulnerabilities | |||||
|---|---|---|---|---|---|
| Version | Suggest | Low | Medium | High | Critical |
| 0.7.12 | 0 | 0 | 0 | 0 | 0 |
| 0.7.11 | 0 | 0 | 0 | 0 | 0 |
| 0.7.10 | 0 | 0 | 0 | 0 | 0 |
| 0.7.9 | 0 | 0 | 0 | 0 | 0 |
| 0.7.8 | 0 | 0 | 0 | 0 | 0 |
| 0.7.7 | 0 | 0 | 0 | 0 | 0 |
| 0.7.6 | 0 | 0 | 0 | 0 | 0 |
| 0.7.5 | 0 | 0 | 0 | 0 | 0 |
| 0.7.4 | 0 | 0 | 0 | 0 | 0 |
| 0.7.3 | 0 | 0 | 0 | 0 | 0 |
| 0.7.2 | 0 | 0 | 0 | 0 | 0 |
| 0.7.1.post4 | 0 | 0 | 0 | 0 | 0 |
| 0.7.1.post3 | 0 | 0 | 0 | 0 | 0 |
| 0.7.1.post2 | 0 | 0 | 0 | 0 | 0 |
| 0.7.1.post1 | 0 | 0 | 0 | 0 | 0 |
| 0.7.1 | 0 | 0 | 0 | 0 | 0 |
| 0.7.0 | 0 | 0 | 0 | 0 | 0 |
| 0.6.8 | 0 | 0 | 0 | 0 | 0 |
| 0.6.7.post2 | 0 | 0 | 0 | 0 | 0 |
| 0.6.7.post1 | 0 | 0 | 0 | 0 | 0 |
| 0.6.7 | 0 | 0 | 0 | 0 | 0 |
| 0.6.6 | 0 | 0 | 0 | 0 | 0 |
| 0.6.5.post1 | 0 | 0 | 0 | 0 | 0 |
| 0.6.5 | 0 | 0 | 0 | 0 | 0 |
| 0.6.4.post1 | 0 | 0 | 0 | 0 | 0 |
| 0.6.4 | 0 | 0 | 0 | 0 | 0 |
| 0.6.3 | 0 | 0 | 0 | 0 | 0 |
| 0.6.2 | 0 | 0 | 0 | 0 | 0 |
| 0.6.1 | 0 | 0 | 0 | 0 | 0 |
| 0.6.0 | 0 | 0 | 0 | 0 | 0 |
| 0.5.2 | 0 | 0 | 0 | 0 | 0 |
| 0.5.1 | 0 | 0 | 0 | 0 | 0 |
| 0.5.0a3 | 0 | 0 | 0 | 0 | 0 |
| 0.5.0a0 | 0 | 0 | 0 | 0 | 0 |
| 0.5.0.post2 | 0 | 0 | 0 | 0 | 0 |
| 0.5.0.post1 | 0 | 0 | 0 | 0 | 0 |
| 0.5.0 | 0 | 0 | 0 | 0 | 0 |
| 0.4.7 | 0 | 0 | 0 | 0 | 0 |
| 0.4.6 | 0 | 0 | 0 | 0 | 0 |
| 0.4.5.post3 | 0 | 0 | 0 | 0 | 0 |
| 0.4.5.post2 | 0 | 0 | 0 | 0 | 0 |
| 0.4.5.post1 | 0 | 0 | 0 | 0 | 0 |
| 0.4.5 | 0 | 0 | 0 | 0 | 0 |
| 0.4.4 | 0 | 0 | 0 | 0 | 0 |
| 0.4.3 | 0 | 0 | 0 | 0 | 0 |
| 0.4.3a0 | 0 | 0 | 0 | 0 | 0 |
| 0.4.2 | 0 | 0 | 0 | 0 | 0 |
| 0.4.1 | 0 | 0 | 0 | 0 | 0 |
| 0.4.0 | 0 | 0 | 0 | 0 | 0 |
| 0.3.1 | 0 | 0 | 0 | 0 | 0 |
| 0.3.0 | 0 | 0 | 0 | 0 | 0 |
| 0.2.0 | 0 | 0 | 0 | 0 | 0 |
0.7.12 - This version is safe to use because it has no known security vulnerabilities at this time. Find out if your coding project uses this component and get notified of any reported security vulnerabilities with Meterian-X Open Source Security Platform
Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.
MIT - MIT LicenseA set of Data analysis tools in pYTHON 3.x.
Dython was designed with analysis usage in mind - meaning ease-of-use, functionality and readability are the core values of this library.
Dython can be installed directly using pip:
pip install dython
or, via the conda package manager:
conda install -c conda-forge dython
Modules documentation can be found on shakedzy.xyz/dython. You can also learn more and see examples of the main methods of this library on these blogposts.
Contributions are always welcomed - if you found something you can fix, or have an idea for a new feature, feel free to write it and open a pull request. Please make sure to go over the contributions guidelines.
When using Dython, please cite it using this citation:
@article{Zychlinski2025,
doi = {10.21105/joss.09174},
url = {https://doi.org/10.21105/joss.09174},
year = {2025},
publisher = {The Open Journal},
volume = {10},
number = {116},
pages = {9174},
author = {Shaked Zychlinski},
title = {dython: A Set of Analysis and Visualization Tools for Data and Variables in Python},
journal = {Journal of Open Source Software}
}