Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
github.com/jadefish/avatar
Avatar is an emulator for Ultima Online: Renaissance.
$ mkdir logs
$ login 2>>logs/login.log &
$ game 2>>logs/game.log &
TODO
Requirements:
$ goenv install
$ make
Find login
and game
in the bin/
directory.
or:
$ OUT_DIR=/some/where/else GOOS=windows GOARCH=amd64 make
Read the Makefile
for more options.
Provide configuration via a .env
file located in the runtime directory
or via values present in the runtime environment.
Get started by creating .env
:
$ cp .env.example ./bin/.env
Values provided in the runtime environment override values present in the
.env
file.
login
By default, login
listens on localhost:7775
. Change this address by
specifying a value for LOGIN_ADDR
:
LOGIN_ADDR=10.1.2.3:55940
game
TODO
Specify a storage provider by setting the value of the STORAGE_PROVIDER
environment variable.
postgres
DB_CONNECTION_STRING
must also be present.memory
(not recommended)STORAGE_PROVIDER=postgres
DB_CONNECTION_STRING="user=worker password=foobarbazbat"
Specify a password hashing algorithm by setting the value of the
PASSWORD_CIPHER
environment variable.
bcrypt
BCRYPT_COST
(default: 10) may optionally be present.You should not change the password hashing algorithm after creating accounts as subsequent password verification would fail.
PASSWORD_CIPHER=bcrypt
BCRYPT_COST=7
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.