
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
@actionsflow/trigger-telegram_bot
Advanced tools
@actionsflow/trigger-telegram_bot
This is a telegram bot trigger of Actionsflow. telegram_bot
trigger is triggered when new messages of telegram bot are detected. This trigger supports to specify one message type or multiple message types
This is an official trigger, you don't need to install it manually.
# single message type
on:
telegram_bot:
event: text
token: ${{ secrets.TELEGRAM_BOT_TOKEN }}
# multiple message types
on:
telegram_bot:
event:
- photo
- text
token: ${{ secrets.TELEGRAM_BOT_TOKEN }}
token
, optional, if webhook
is false
, then token
is required. Telegram bot token, you should get it from Telegram BotFather, for example: 123456:ABC-DEF1234ghIkl-zyx57W2v1u123ew11
webhook
, optional, boolean
, if use telegram webhook mode to get telegram message updates, the default value is false
, the trigger will poll to get telegram updates. , if true
, you must set webhook through telegram's setWebhook
API, the webhook URL should be https://webhook.actionsflow.workers.dev/<owner>/<repo>/<workflow-file-name>/telegram_bot?__token=<your-github-personal-token>
, learn more about webhook URL, see here, here is a CURL example to set webhook:
curl --request POST 'https://api.telegram.org/bot123456:ABC-DEF1234ghIkl-zyx57W2v1u123ew11/setWebhook' \
--header 'Content-Type: application/json' \
--data-raw '{
"url": "https://webhook.actionsflow.workers.dev/<owner>/<repo>/<workflow-file-name>/telegram_bot?__token=<your-github-personal-token>"
}'
event
, optional, string
or string[]
, telegram message type, allowed types:
text
animation
audio
channel_chat_created
contact
delete_chat_photo
dice
document
game
group_chat_created
invoice
left_chat_member
location
migrate_from_chat_id
migrate_to_chat_id
new_chat_members
new_chat_photo
new_chat_title
passport_data
photo
pinned_message
poll
sticker
successful_payment
supergroup_chat_created
video
video_note
voice
if event
is not provided, all message will be triggered. example: ["text","photo"]
,text
You can use General Config for Actionsflow Trigger for more customization.
This trigger's outputs will be the item of the telegram message, you can see it here
An outputs example:
{
"message_id": 7,
"from": {
"id": 1056059698,
"is_bot": false,
"first_name": "Owen",
"last_name": "Young",
"language_code": "en"
},
"chat": {
"id": 1056059698,
"first_name": "Owen",
"last_name": "Young",
"type": "private"
},
"date": 1598383043,
"text": "test",
"update_id": 791185172
}
You can use the outputs like this:
on:
telegram_bot:
token: ${{ secrets.TELEGRAM_BOT_TOKEN }}
jobs:
print:
name: Print
runs-on: ubuntu-latest
steps:
- name: Print Outputs
env:
telegram_text: ${{ on.telegram_bot.outputs.text }}
run: |
echo telegram text: $telegram_text
FAQs
Actionsflow trigger telegram bot
The npm package @actionsflow/trigger-telegram_bot receives a total of 151 weekly downloads. As such, @actionsflow/trigger-telegram_bot popularity was classified as not popular.
We found that @actionsflow/trigger-telegram_bot demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.