Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@arcana/keystore
Advanced tools
Base Library to make calls to Arcana DKG network.
The network assumes that n/4 of nodes may be malicious, and n/2 + 1 of the nodes are required for key reconstruction. With these assumption, all fetch share calls are checked for consistency while enabling early exit on best case scenario where first n/2 + 1 responses are from honest nodes.
npm install -S @arcana/keystore
yarn add @arcana/keystore
import { KeyReconstructor } from '@arcana/keystore';
const { KeyReconstructor } = window.arcana.keystore;
const appID = "0x..." // Get this from arcana dashboard
const keystore = new KeyReconstructor({ appID, network: 'testnet' })
const verifier = "google" // twitter, github, twitch, discord, reddit
const id = "abc@google.com" // See examples how to get user id for each verifier
const idToken = "..."
const publicKey = keystore.getPublicKey({ verifier, id });
const privateKey = keystore.getPrivateKey({ verifier, id, idToken })
FAQs
Base Library to make calls to Arcana DKG network
The npm package @arcana/keystore receives a total of 0 weekly downloads. As such, @arcana/keystore popularity was classified as not popular.
We found that @arcana/keystore demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.