
Security News
/Research
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
@campminder/side-nav
Advanced tools
This document provides instructions on how to publish and use the Side Nav component.
This document provides instructions on how to publish and use the Side Nav component.
Note: The publishToNpm
command pushes the package to the npm registry. The exact timing of when unpkg grabs from the npm registry is not known.
To use the Side Nav component in your project, you need to include the following scripts in your HTML file:
<script
type="module"
crossorigin
src="https://unpkg.com/@campminder/side-nav"></script>
Then, you can use the side-nav custom HTML element in your HTML document. This element will be replaced by the Side Nav component:
<side-nav></side-nav>
The scripts import JavaScript files from a Content Delivery Network (CDN) into a webpage. The type="module" attribute specifies that the script should be treated as an ECMAScript module. The crossorigin attribute is used to allow the script to be fetched from a third-party site with the appropriate CORS headers.
The side-nav custom HTML element is defined in one of the imported JavaScript files. When used in an HTML document, it will be replaced by the content or functionality defined for the side-nav custom element in the JavaScript code.
Links live in src/data . Please refer to the README contained at that level.
Tests live in src/test.
Run the test with the following:
pnpm run test
FAQs
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.