Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@amazeeio/amazeeio-logs
Advanced tools
This is a nodejs helper called amazeeio-logs
within the amazeeio lagoon deployment system.
It allows nodejs services to log messages to the amazeeio-logs
rabbitmq exchange, which then are handled by other services like elasticsearch and slack.
import { sendToAmazeeioLogs, initSendToAmazeeioLogs } from '@amazeeio/amazeeio-logs';
initSendToAmazeeioLogs();
sendToAmazeeioLogs(severity: string, sitegroup: string, uuid: string, event: string, meta: object, message: string)
severity
- one of error, warn, info, verbose, debug, silly
based on winston log levelssitegroup
- sitegroup this log message belongs to, can be empty stringuuid
- webhook uuid this log message belongs to, can be emptyevent
- name of the event to be logged, is used to define were the log should be displayed later (like slack, hipchat, etc.)meta
- additional information about the message in a javascript objectmessage
- human readable text of the log message, which will be used when the message is shown to humans (like slack)Fully developed in Docker and hosted on amazee.io Openshift, see the .openshift
folder. Deployed via Jenkinsfile.
Uses amazeeio/centos7-node:node6
as base image.
FAQs
amazeeio logs sdk
The npm package @amazeeio/amazeeio-logs receives a total of 9 weekly downloads. As such, @amazeeio/amazeeio-logs popularity was classified as not popular.
We found that @amazeeio/amazeeio-logs demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.