Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@celo/celocli
Advanced tools
Tool for interacting with the Celo Protocol.
Use yarn build:sdk <NETWORK>
to build the sdk for the target environment (CLI dependency).
Use yarn build
to compile the CLI.
Use yarn docs
to populate packages/docs
with generated documentation. Generated files should be checked in, and CI will fail if CLI modifications cause changes in the docs which were not checked in.
See @celo/dev-cli for how we customize doc generation.
I'm getting the follow error:
Cannot find module '@celo/contractkit'
.
A possible solution is to build the monorepo manually.
Go to the celo-monorepo
root directory and
> yarn build
If all works well, navigate to packages/cli
.
I've got the cli built successfully but the running the
cli
yields:Error: Returned values aren't valid, did it run Out of Gas?
.
When running the cli
against a full node, this can mean that the contract artifacts are out of date.
Solution: switch to the alfajores
branch and build the celo-monorepo
.
Go to the celo-monorepo
root directory and
> git checkout alfajores
> yarn
> yarn build
> cd packages/cli
> ./bin/run account:balance $CELO_ACCOUNT_ADDRESS
FAQs
CLI Tool for transacting with the Celo protocol
The npm package @celo/celocli receives a total of 253 weekly downloads. As such, @celo/celocli popularity was classified as not popular.
We found that @celo/celocli demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 8 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.