Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
@33cn/chain33-rpc-api
Advanced tools
封装了chain33 rpc接口除Wallet接口和挖矿接口外的所有系统接口(不兼容低于6.0.2的版本),Token和Trade系统合约接口。[2018/12/10]
http://114.55.101.159:8801 是测试链的一个节点
http://120.79.156.149:8801 是正式链的一个节点
npm i @33cn/chain33-rpc-api -S
https://github.com/matthew-andrews/isomorphic-fetch
npm install --save isomorphic-fetch es6-promise
#####使用示例:获取节点的最新高度:
import BtyBaseSdk from 'chain33-rpc-api'
// 新建一个BtyBaseSdk实例,设置默认请求节点和请求错误处理函数(可选,如果不设置可以在方法返回的promise用catch捕获到错误)
let chain33Rpc = new BtyBaseSdk('https://testnet.bityuan.com/api', (error) => {
console.log('catch error ' + error)
})
// 获取节点的最新高度
chain33Rpc.getLasterHeader().then(res => {
if (res.error) throw new Error(res.error)
const { height } = res.result
console.log('height', height)
})
// 传入url参数指定请求节点
chain33Rpc.getLasterHeader('https://mainnet.bityuan.com/api').then(res => {
if (res.error) throw new Error(res.error)
const { height } = res.result
console.log('height', height)
})
创建地址
多重签名账户地址
owner地址
多重签名下交易hash
FAQs
chain33 rpc 接口封装
The npm package @33cn/chain33-rpc-api receives a total of 38 weekly downloads. As such, @33cn/chain33-rpc-api popularity was classified as not popular.
We found that @33cn/chain33-rpc-api demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 9 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.