
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
@atcute/crypto
Advanced tools
cryptographic utilities for AT Protocol.
npm install @atcute/crypto
this package provides key generation, signing, and verification for the two elliptic curve systems used by AT Protocol to certify identity and repository data:
p256: uses WebCrypto APIsecp256k1: uses node:crypto on Node.js, @noble/secp256k1 elsewhereimport { Secp256k1PrivateKeyExportable, P256PrivateKeyExportable } from '@atcute/crypto';
// secp256k1 keypair
const keypair = await Secp256k1PrivateKeyExportable.createKeypair();
// p256 keypair
const p256Keypair = await P256PrivateKeyExportable.createKeypair();
// sign() hashes the data and signs it
const data = new Uint8Array([1, 2, 3, 4, 5, 6, 7, 8]);
const sig = await keypair.sign(data);
// export as did:key format
const didKey = await keypair.exportPublicKey('did');
// -> "did:key:zQ3shVRtgqTRHC7Lj4DYScoDgReNpsDp3HBnuKBKt1FSXKQ38"
// export as multibase
const multibase = await keypair.exportPublicKey('multibase');
import { verifySigWithDidKey } from '@atcute/crypto';
// verify using did:key (automatically detects curve type)
const ok = await verifySigWithDidKey(didKey, sig, data);
FAQs
lightweight atproto cryptographic library
We found that @atcute/crypto demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.