
Research
NPM targeted by malware campaign mimicking familiar library names
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
@crestron/ch5-shell-utilities-cli
Advanced tools
Shell Project creation utilities from the ch5-shell-cli library wrapped as CLI commands.
The purpose of the library is to expose the ch5-shell-cli commands.
Updates to the Crestron HTML5 User Interface and documentation are avalilable in the following link https://sdkcon78221.crestron.com/sdk/Crestron_HTML5UI/Content/Topics/Whats-New.htm
Copyright (C) 2023 to the present, Crestron Electronics, Inc.
All rights reserved.
No part of this software may be reproduced in any form, machine or natural, without the express written consent of Crestron Electronics.
Use of this source code is subject to the terms of the Crestron Software License Agreement under which you licensed this source code. For the terms of the license, please see the license agreement between you and Crestron at http://www.crestron.com/sla.
FAQs
CH5 Shell Utilities CLI for command scripts
We found that @crestron/ch5-shell-utilities-cli demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
Research
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.