Yamale

Latest version: v6.0.0

Safety actively analyzes 706259 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 2 of 5

4.0.4

Not secure
Enable 'yamale -v' for version reporting.

4.0.2

Not secure
Adds new constraint options for strings.

4.0.0

Not secure
This release is created to address the following issue: https://github.com/23andMe/Yamale/issues/167

The change in PR https://github.com/23andMe/Yamale/pull/173 mitigates that specific issue. We are unaware of any backwards incompatibility with the introduction of this fix, but we wanted to increment the major version number in case there are users with more complex schemas than what we test again.

We've also included the following warning in our README:

> ⚠️ Ensure that your schema definitions come from internal or trusted sources. Yamale does not protect against intentionally malicious schemas.

3.0.8

Not secure
This release fixes a bug where a well-formed schema file can execute arbitrary code on the system running Yamale.

3.0.2

Not secure
Fixes 119, strict mode was not the default on the command line....but it was for the API. This fix ensures strict mode is the default in all uses.

3.0.0

Not secure
**Note**: Due to a packaging bug, users running Python 2.x should pin the major version of Yamale to 2.x.

We're doing a major version jump to include the following changes:
* Remove Python 2.x support
* Make the default validation "strict". The `--strict` command line is now replaced with `--no-strict` for those that want the old behavior. See the README for more details.
* Prevent int and num validators from accepting bool values. 109

Page 2 of 5

© 2025 Safety CLI Cybersecurity Inc. All Rights Reserved.