Research
Security News
Malicious npm Package Targets Solana Developers and Hijacks Funds
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
github.com/xbl3/ggsrun_tanaikech
This is a CLI tool to execute Google Apps Script (GAS) on a terminal. Also this CLI tool can be used for managing files in Google Drive for OAuth2 and Service Account.
Will you want to develop GAS on your local PC? Generally, when we develop GAS, we have to login to Google using own browser and develop it on the Script Editor. Recently, I have wanted to have more convenient local-environment for developing GAS. So I created this "ggsrun". The main work is to execute GAS on local terminal and retrieve the results from Google. Furthermore, this tool can be also used for managing files in own Google Drive (OAuth2) and Google Drive for Service Account.
Features of "ggsrun" are as follows.
Download an executable file of ggsrun from the release page and import to a directory with path.
or
Use go get.
$ go get -u github.com/tanaikech/ggsrun
IMPORTANT: Please check this.
At April 8, 2019, the specification of Google Apps Script Project was changed. By this, when new GAS project is created after April 8, 2019, in order to use Goole API (Google Apps Script API and Drive API which can be used by ggsrun.), the GAS project is required to link to Cloud Platform Project. When you use the GAS project creted after April 8, 2019, at first, please do this flow.
After the GAS project was linked to Cloud Platform Project by above flow, please do "Basic setting flow" at the next section.
When you click each link of title, you can see the detail information.
115-19njNHlbT-NI0hMPDnVO1sdrw2tJKCAJgOTIAPbi_jq3tOo4lVRov
client_secret.json
using download button.client_secret.json
.
https://console.cloud.google.com/apis/library/script.googleapis.com/?project=### project ID ###
https://console.cloud.google.com/apis/api/drive.googleapis.com/?project=### project ID ###
$ ggsrun auth
at the directory with client_secret.json
.function main(){return Beacon()}
as sample.gs
.$ ggsrun e2 -s sample.gs -i [Script ID] -j
. Script ID is ID of the project installed the server.Congratulation! You got ggsrun!
Please reauthorize to include a new scope to the access token as follows.
client_secret.json
.
https://console.cloud.google.com/apis/library/script.googleapis.com/?project=### project ID ###
https://www.googleapis.com/auth/script.projects
to ggsrun.cfg
.client_secret.json
and ggsrun.cfg
.
$ ggsrun auth
Completed!
ggsrun can access to Google Drive using Service Account. When OAuth2 is used, you can see the files and folders in own Google Drive. When Service Account is used, you can see them in Google Drive for Service Account. Namely, the Drive for OAuth2 is different from that for Service Account. Please be careful this. And when Service Account is used, there are what it can do and what it can't do. About them, please read here.
If you have any questions and commissions for me, feel free to tell me using e-mail tanaike@hotmail.com
You can see the Update History at here.
If you want to read the detail manual, please check here.
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.
Security News
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.