Spaces:
Running
Running
Diego Carpintero
commited on
Commit
•
dda22df
1
Parent(s):
7a6e4a3
abstract tools into a class
Browse files
tools.py
ADDED
@@ -0,0 +1,90 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
import os
|
2 |
+
from typing import Dict, List, Tuple
|
3 |
+
|
4 |
+
from PIL import Image
|
5 |
+
import pytesseract
|
6 |
+
import requests
|
7 |
+
from dotenv import load_dotenv, find_dotenv
|
8 |
+
|
9 |
+
|
10 |
+
class Tools:
|
11 |
+
def __init__(self):
|
12 |
+
load_dotenv(find_dotenv())
|
13 |
+
|
14 |
+
self.safebrowsing_key = os.getenv("SAFEBROWSING_API_KEY")
|
15 |
+
self.api_base_url = "https://safebrowsing.googleapis.com/v4"
|
16 |
+
self.client_id = "minerva"
|
17 |
+
self.client_version = "0.1.0"
|
18 |
+
self.threat_types = [
|
19 |
+
"MALWARE",
|
20 |
+
"SOCIAL_ENGINEERING",
|
21 |
+
"UNWANTED_SOFTWARE",
|
22 |
+
"POTENTIALLY_HARMFUL_APPLICATION"
|
23 |
+
]
|
24 |
+
|
25 |
+
def ocr(self, image_path: str) -> str:
|
26 |
+
"""Extract text from image using OCR
|
27 |
+
"""
|
28 |
+
try:
|
29 |
+
image = Image.open(image_path)
|
30 |
+
text = pytesseract.image_to_string(image)
|
31 |
+
return text
|
32 |
+
except Exception as e:
|
33 |
+
return f"Error in text extraction: {str(e)}"
|
34 |
+
|
35 |
+
def expand_url(self, url: str) -> str:
|
36 |
+
"""Expand shortened URL
|
37 |
+
"""
|
38 |
+
try:
|
39 |
+
response = requests.head(url, allow_redirects=True)
|
40 |
+
return response.url
|
41 |
+
except requests.exceptions.RequestException as e:
|
42 |
+
return url # Return original URL if expansion fails
|
43 |
+
|
44 |
+
def is_url_safe(self, url: str) -> Tuple[bool, List[Dict[str, str]]]:
|
45 |
+
"""Check if URL is safe using Google Safe Browsing API
|
46 |
+
"""
|
47 |
+
if not self.safebrowsing_key:
|
48 |
+
raise ValueError("SAFEBROWSING_API_KEY is missing.")
|
49 |
+
|
50 |
+
api_endpoint = f"{self.api_base_url}/threatMatches:find?key={self.safebrowsing_key}"
|
51 |
+
expanded_url = self.expand_url(url)
|
52 |
+
|
53 |
+
request_body = {
|
54 |
+
"client": {
|
55 |
+
"clientId": self.client_id,
|
56 |
+
"clientVersion": self.client_version
|
57 |
+
},
|
58 |
+
"threatInfo": {
|
59 |
+
"threatTypes": self.threat_types,
|
60 |
+
"platformTypes": ["ANY_PLATFORM"],
|
61 |
+
"threatEntryTypes": ["URL"],
|
62 |
+
"threatEntries": [
|
63 |
+
{"url": url},
|
64 |
+
{"url": expanded_url} if expanded_url != url else {}
|
65 |
+
]
|
66 |
+
}
|
67 |
+
}
|
68 |
+
|
69 |
+
try:
|
70 |
+
response = requests.post(api_endpoint, json=request_body)
|
71 |
+
response.raise_for_status()
|
72 |
+
|
73 |
+
result = response.json()
|
74 |
+
|
75 |
+
if not result:
|
76 |
+
return True, []
|
77 |
+
|
78 |
+
threats = []
|
79 |
+
if "matches" in result:
|
80 |
+
for match in result["matches"]:
|
81 |
+
threats.append({
|
82 |
+
"threat_type": match.get("threatType"),
|
83 |
+
"platform_type": match.get("platformType"),
|
84 |
+
"threat_entry_type": match.get("threatEntryType")
|
85 |
+
})
|
86 |
+
|
87 |
+
return False, threats
|
88 |
+
|
89 |
+
except requests.exceptions.RequestException as e:
|
90 |
+
raise Exception(f"Error checking URL safety: {str(e)}")
|