@appliedblockchain/k0-util
Advanced tools
Comparing version 0.0.11 to 0.0.12
43
index.js
@@ -5,11 +5,4 @@ 'use strict' | ||
const BN = require('bn.js') | ||
const execAsync = require('./exec-async') | ||
const path = require('path') | ||
const chalk = require('chalk') | ||
const baseDir = path.join(__dirname, '..', '..', '..') | ||
const cppDir = process.env.CPP_DIR || path.join(baseDir, 'cpp') | ||
const cppUtilDir = process.env.CPP_UTIL_DIR || path.join(cppDir, 'build', 'src') | ||
const { env } = process | ||
const buf2hex = buf => '0x' + buf.toString('hex') | ||
@@ -125,35 +118,2 @@ | ||
async function pack256Bits(buf) { | ||
checkBuf(buf, 32) | ||
const hex = buf2hex(buf) | ||
let executablePath | ||
if (env.CIRCLECI) { | ||
executablePath = `docker run appliedblockchain/zktrading-pack:${env.CIRCLE_BRANCH}-${env.CIRCLE_SHA1}` | ||
} else { | ||
executablePath = path.join(cppUtilDir, 'pack_256_bits') | ||
} | ||
const command = `${executablePath} ${hex}` | ||
const result = await execAsync(command) | ||
return result.stdout.trim().split(',').map(str => new BN(str)) | ||
} | ||
function unpack(bns) { | ||
return unpack256Bits(bns[0], bns[1]) | ||
} | ||
async function unpack256Bits(val1, val2) { | ||
let executablePath | ||
if (process.env.CIRCLECI) { | ||
executablePath = `docker run appliedblockchain/zktrading-unpack:${env.CIRCLE_BRANCH}-${env.CIRCLE_SHA1}` | ||
} else { | ||
executablePath = path.join(cppUtilDir, 'unpack_256_bits') | ||
} | ||
const command = `${executablePath} ${val1.toString()} ${val2.toString()}` | ||
const result = await execAsync(command) | ||
return hex2buf(result.stdout.trim()) | ||
} | ||
const ZERO_ADDRESS = '0x0000000000000000000000000000000000000000' | ||
@@ -190,9 +150,6 @@ | ||
wait, | ||
pack256Bits, | ||
parseG1Point, | ||
parseG2Point, | ||
unpack, | ||
unpack256Bits, | ||
ZERO_ADDRESS, | ||
readBooleanFromENV | ||
} |
{ | ||
"name": "@appliedblockchain/k0-util", | ||
"version": "0.0.11", | ||
"version": "0.0.12", | ||
"dependencies": { | ||
"bn.js": "^4.11.8" | ||
}, | ||
"gitHead": "aa606e82061b40f6184aec8d9d229da7227d9112" | ||
"gitHead": "6a9137c98511227bb1ac0bffbb549743be56403e" | ||
} |
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
2
0
5300
3
212