Quote from: kmfkewm on September 06, 2012, 10:29 pmIt is not impossible to hide a backdoor of sorts in a python script.You'd still have to open a socket connection and import a module that allowed that (e.g. os, socket, urllib, urllib2 and a bunch of others for specific protocols). At that point the game would be up unless the the script needed those modules for some other legitimate purpose.The only one of those I've even considered using is the os module, which allows access to invoking features of the operating system (e.g. a command from the command line). This would probably be necessary to port the code to Windows and cut the bash scripts out, while still being able to do things like invoke GPG (there is no way in Hell I'm going to try my own implementation of the entire OpenPGP protocol for this).Quote from: kmfkewm on September 06, 2012, 10:29 pmThe TCPServer call gives it away but if I spent more time on it I could probably obfuscate that as well. I have not tested this but think it should work.Yes, just as a socket call would in Python. Of the three Python files in SROPPy two of them import the csv module and one of them does not import any modules. The rest of it uses the built-in fuctions of the language.