The PyPI repository has removed a Python package called 'mitmproxy2' that was an identical copy of the official "mitmproxy" library, but with an "artificially introduced" code execution vulnerability.
A clear and concise description of what the bug is. File "C:\Users\mrha1\AppData\Roaming\Python\Python312\site-packages\mitmproxy\proxy\layers\quic_stream_layers.py", line 91, in _handle_event yield ...
I'm unable to get the flows of the unpinned packages with the python DumpMaster. It's not the same when I did with CLI tools of mitmweb, mitmdump or mitmproxy. I wonder are there any configuratinal ...