Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
github.com/google/certificate-transparency-go
This repository holds Go code related to Certificate Transparency (CT). The repository requires Go version 1.22.
The main parts of the repository are:
asn1/
and x509/
are forks of the upstream Go encoding/asn1
and
crypto/x509
libraries. We maintain separate forks of these packages
because CT is intended to act as an observatory of certificates across the
ecosystem; as such, we need to be able to process somewhat-malformed
certificates that the stricter upstream code would (correctly) reject.
Our x509
fork also includes code for working with the
pre-certificates defined in RFC 6962.tls
holds a library for processing TLS-encoded data as described in
RFC 5246.x509util/
provides additional utilities for dealing with
x509.Certificate
s.ct
package (in .
) holds types and utilities for working
with CT data structures defined in
RFC 6962.client/
and jsonclient/
hold libraries that allow access to CT Logs
via HTTP entrypoints described in
section 4 of RFC 6962.dnsclient/
has a library that allows access to CT Logs over
DNS.scanner/
holds a library for scanning the entire contents of an existing
CT Log.trillian/
holds code that allows a Certificate Transparency Log to be
run using a Trillian Log as its back-end -- see
below../client/ctclient
allows interaction with a CT Log../ctutil/sctcheck
allows SCTs (signed certificate timestamps) from a CT
Log to be verified../scanner/scanlog
allows an existing CT Log to be scanned for certificates
of interest; please be polite when running this tool against a Log../x509util/certcheck
allows display and verification of certificates./x509util/crlcheck
allows display and verification of certificate
revocation lists (CRLs).ctutil/
holds utility functions for validating and verifying CT data
structures.loglist3/
has a library for reading
v3 JSON lists of CT Logs.The trillian/
subdirectory holds code and scripts for running a CT Log based
on the Trillian general transparency Log,
and is documented separately.
Developers who want to make changes to the codebase need some additional dependencies and tools, described in the following sections.
The scripts/presubmit.sh
script runs various tools
and tests over the codebase; please ensure this script passes before sending
pull requests for review.
# Install golangci-lint
go install github.com/golangci/golangci-lint/cmd/golangci-lint@v1.55.1
# Run code generation, build, test and linters
./scripts/presubmit.sh
# Run build, test and linters but skip code generation
./scripts/presubmit.sh --no-generate
# Or just run the linters alone:
golangci-lint run
Some of the CT Go code is autogenerated from other files:
.pb.go
implementations.trillian/mockclient
) is
created with GoMock.Re-generating mock or protobuffer files is only needed if you're changing the original files; if you do, you'll need to install the prerequisites:
go
can be installed with a single run of go install
(courtesy of tools.go
and go.mod
).protoc
tool: you'll need version 3.20.1 installed, and PATH
updated to include its bin/
directory.With tools installed, run the following:
go generate -x ./... # hunts for //go:generate comments and runs them
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.