I have been using electrum python (old 3.x.y version) and Appimage on Linux, lately the Appimage of 4.1.2
As 4.1.2 is getting a bit old too, maybe I should update to a more recent version.
However, I am concerned with security, and having python code would allow me to read it.
I know quite a bit of python, but I am no networking Guru- is there maybe a collection of suspicious code fragments to search for in the python code?
This seems esp. important because a malware would be hidden in some otherwise networking unrelated module and be called from some unconspicuous function for obfuscation.
Like, the typical routines a malware would use, like establishing network connections other than to the electrum servers etc.?
The AppImage is just an archive containing all the binaries and libraries and other supporting files zipped together in one large format. You can extract it by opening the terminal and typing the name and path of the AppImage following by --appimage-extract and there should be some folder in /tmp created where you can see all the Python sources contained inside site_packages.
Any of these alternate methods can be used to unzip the appimage too:
https://superuser.com/questions/1301583/how-can-i-extract-files-from-an-appimage