
Security News
/Research
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
@d10r/snapshot-strategies
Advanced tools
yarn
yarn build
Note: If you're writing a new strategy, make sure to add it to strategies/index.ts before testing*
# Test default strategy (erc20-balance-of)
yarn test
# Test strategy with name
yarn test --strategy=erc20-received
yarn test --strategy=eth-balance
# Test with more addresses from addresses.json
yarn test --strategy=eth-balance --more=200
yarn test:validation --validation=basic
Change values inside test/scores.ts and run
ts-node test/scores.ts
Here is a simple checklist to look at when reviewing a PR for a new strategy:
basic
validation and use existing strategiessnapshot
to calculate user's voting power. As a result the voting power should not change throughout the proposal duration.MIT.
FAQs
## Development
The npm package @d10r/snapshot-strategies receives a total of 0 weekly downloads. As such, @d10r/snapshot-strategies popularity was classified as not popular.
We found that @d10r/snapshot-strategies demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.