Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@contrast/patcher
Advanced tools
@contrast/patcher
Monkey patching.
This was ported directly from the node-agent
but code with every dependency commented out. As a result there are differences in parity.
Removed dependency on AsyncStorage
.
Old Behavior
Pre and post hooks only run when async storage context indicates an active request scope.
New Behavior
Hooks always run, independent of request scope.
Removed dependency on agent
and perf-logger
.
Old Behavior
A configuration setting would allow for logging of perf data of hooks and original function calls.
New Behavior
Performance logging of hooks is non-funcitonal.
Removed the dependency on scopes
.
Old Behavior
One could specify a scope
in the hook options and the original function would be run in that scope. This allowed control over when to run instrumentaion based on current scope value.
Also, the alwaysRun
option forced hooks to run independent of scope state.
New Behavior
There are no notions of scopes yet in v5. Patcher instrumentation always runs.
The scope
and alwaysRun
options are effectively ignored.
Removed the dependency on tracker
.
Old Behavior
We used to short-circuit __add
function if tracker showed all arguments to be untracked.
New Behavior
We do not make this check; no short-circuiting.
FAQs
Advanced monkey patching--registers hooks to run in and around functions
The npm package @contrast/patcher receives a total of 13,086 weekly downloads. As such, @contrast/patcher popularity was classified as popular.
We found that @contrast/patcher demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.