Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
github.com/linkedin/diderot
(pronounced dee-duh-row)
Diderot is a server implementation of the xDS protocol that makes it extremely easy and efficient to implement a control plane for your Envoy and gRPC services. For the most up-to-date information, please visit the documentation.
The only thing you need to implement to make your resources available via xDS is a
diderot.ResourceLocator
(link). It is the interface
exposed by the ADS server implementation which should
contain the business logic of all your resource definitions and how to find them. To facilitate this implementation,
Diderot provides an efficient, low-resource cache that supports
highly concurrent updates. By leveraging the cache implementation for the heavy lifting, you will be able to focus on
the meaningful part of operating your own xDS control plane: your resource definitions.
Once you have implemented your ResourceLocator
, you can simply drop in a diderot.ADSServer
to your gRPC service, and
you're ready to go! Please refer to the examples/quickstart package
Diderot's ADS server implementation is a faithful implementation of the xDS protocol. This means it implements both the
State-of-the-World and Delta/Incremental variants. It supports advanced features such as
glob collections, unlocking the more
efficient alternative to the EDS
stage: LEDS
(design doc).
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.