Latest version: v0.3.2
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Bring parity to Pyramid and Celery by creating a full Pyramid application in the Celery worker and providing a request object for each task.
No known vulnerabilities found
Has known vulnerabilities