
Research
/Security News
11 Malicious Go Packages Distribute Obfuscated Remote Payloads
Socket uncovered 11 malicious Go packages using obfuscated loaders to fetch and execute second-stage payloads via C2 domains.
github.com/makistsantekidis/argo-web-api
Install Golang and bzr library
Create a new work space:
mkdir ~/go-workspace
export GOPATH=~/go-workspace
You may add the last export
line into the ~/.bashrc
or the ~/.bash_profile
file to have GOPATH
environment variable properly setup upon every login.
Get the latest version and all dependencies:
go get github.com/ARGOeu/argo-web-api
To build the service use the following command:
go build
To run the service use the following command:
./argo-web-api
For a list of options use the following command:
./argo-web-api -h
6. To run the unit-tests:
go test ./...
7. To generate and serve godoc (@port 6060)
godoc -http=:6060
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
Socket uncovered 11 malicious Go packages using obfuscated loaders to fetch and execute second-stage payloads via C2 domains.
Security News
TC39 advances 11 JavaScript proposals, with two moving to Stage 4, bringing better math, binary APIs, and more features one step closer to the ECMAScript spec.
Research
/Security News
A flawed sandbox in @nestjs/devtools-integration lets attackers run code on your machine via CSRF, leading to full Remote Code Execution (RCE).