
Security News
Another Round of TEA Protocol Spam Floods npm, But It’s Not a Worm
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.
Modified to export some usefull methods in order to not re-create an http.Client instance for each authorized user. Forked from dghubble/oauth1.
$ go get github.com/iris-contrib/oauth1@latest
import "github.com/kataras/iris/v12/x/client"
var myClient = client.New(client.BaseURL("https://xxx.xxx.com"))
import "github.com/iris-contrib/oauth1"
var config = &oauth1.Config{
ConsumerKey: "xxx",
ConsumerSecret: "xxx",
CallbackURL: "http://localhost:8080/callback",
Endpoint: oauth1.Endpoint{
RequestTokenURL: "https://xxx.xxx.com/oauth-service/oauth/request_token",
AuthorizeURL: "https://xxx.xxx.com/oauthConfirm",
AccessTokenURL: "https://xxx.xxx.com/oauth-service/oauth/access_token",
},
}
func testPreFilledAccessToken(ctx iris.Context) {
var (
accessToken = "xxx"
accessSecret = "xxx"
)
endpoint := "xxx"
opt := oauth1.RequestOption(config, accessToken, accessSecret)
var resp interface{}
err := garminClient.ReadJSON(ctx, &resp, iris.MethodGet, endpoint, nil, opt)
if err != nil {
ctx.StopWithError(iris.StatusBadGateway, err)
return
}
ctx.JSON(resp)
}
func requestToken(ctx iris.Context) {
requestToken, requestSecret, err := config.RequestToken()
if err != nil {
ctx.Application().Logger().Errorf("request token: %s", err.Error())
return
}
authorizationURL, err := config.AuthorizationURL(requestToken)
if err != nil {
ctx.Application().Logger().Errorf("authorize: %s", err.Error())
return
}
// You have to keep "requestSecret" for the next request, it's up to you.
ctx.Redirect(authorizationURL.String())
}
func oauth1Callback(ctx iris.Context) {
requestToken, verifier, err := oauth1.ParseAuthorizationCallback(ctx.Request())
if err != nil {
ctx.Application().Logger().Errorf("callback: parse auth callback: %s", err.Error())
return
}
// Pass it through url parameters or anything,
// just fill it with the previous handler's result.
var requestSecret string
accessToken, accessSecret, err := config.AccessToken(requestToken, requestSecret, verifier)
if err != nil {
ctx.Application().Logger().Errorf("callback: access token: %s", err.Error())
return
}
}
FAQs
Unknown package
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.

Security News
PyPI adds Trusted Publishing support for GitLab Self-Managed as adoption reaches 25% of uploads

Research
/Security News
A malicious Chrome extension posing as an Ethereum wallet steals seed phrases by encoding them into Sui transactions, enabling full wallet takeover.