For example, it can infer that
getattr(sys.modules["built"+"ins"], "".join(reversed(["al","ev"])))("1+1")
Is basically: eval("1+1").
Currently, I'm testing it on public files where some of them implement malicious behavior, as well as past malicious packages on PyPI.You can see some of the detection examples here: https://github.com/rushter/hexora/blob/main/docs/examples.md
I'd love to hear your feedback and ideas on how to improve this and identify missing rules.