
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
github.com/mikeflynn/go-dash-button
Advanced tools
As the Amazon Dash Buttons have now been retired, I will be archiving this repo.
Original README follows...
go-dash-buttonA server to handle Amazon Dash button actions; Written in golang
This is a simple server that sniffs a preset list of Amazon Dash buttons and triggers a function.
It's not a completely seemless experience. You'll need to clone this repo, and add any Dash button MAC addresses and their action functions to the main.go file.
Once your code is in place, compile with go build and run the binary sudo ./go-dash-button (note that it does require sudo rights).
Compile the code right away and run the server. Set up your Dash Button so that it joins your wireless network, but don't pick the product. Click the Dash button and you'll see the server log out the MAC address.
There is an optional config file system built in. It will look for an ini file at ./go-dash-button.ini but you can use the -conf flag to specify any ini file location and use the data in your job like so:
Config.Section("hue").Key("baseStationIP").String()
FAQs
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.