
Security News
/Research
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
@dallin.b.johnson/authentication-api-key
Advanced tools
API Key authentication strategy for @feathers/authentication
This strategy adds api keys to feathersjs authentication.
Currently it only supports when it's used in conjunction with the "Local Strategy" aswell.
To install and use the strategy, first run npm install @dallin.b.johnson/authentication-api-key
Now add the strategy to your authentication.(ts|js)
like so:
... // other imports
const { ApiKeyStrategy } = require('@dallin.b.johnson/authentication-api-key');
module.exports = app => {
... // Other authentications strategies
authentication.register('api-key', new ApiKeyStrategy()); // add the strategy
... // Rest of the file
};
... // other imports
export default {
before: {
all: [authenticate("jwt", "api-key")], // Add the api-key to the authenticate hook
... // other hooks
};
Now, there are two ways of using this strategy:
To configure this method, just add the keys under the config like so
{
"host": "localhost",
"port": 3030,
"public": "../public/",
"paginate": {
"default": 10,
"max": 50
},
"authentication": {
// other settings
"authStrategies": [
"jwt",
"local",
"api-key" // Add the api key as a strategy
],
"jwtOptions": { // Your JWT options },
// other strategies,
"api-key": {
"headerField": "x-api-key", // Required
"keys": ["KEY HERE"] // Required
}
}
}
Firsly create a service which should handle the API keys. Thats up to you.
Optionally you can add a field to keep track if a key is revoked. eg revoked
.
Now just add entity
and service
to the config like so.
{
"host": "localhost",
"port": 3030,
"public": "../public/",
"paginate": {
"default": 10,
"max": 50
},
"authentication": {
// other settings
"authStrategies": [
"jwt",
"local",
"api-key" // Add the api key as a strategy
],
"jwtOptions": { // Your JWT options },
// other strategies,
"api-key": {
"headerField": "x-api-key", // Required
"entity": "api-key", // Required - The name of the key field
"service": "api-keys", // Required - The name of the service to use.
"revokedField": "revoked" // Optional - The name of the revoked field
"authorizedField": "authorized" // Optional - The name of the authorized field
"activeField": "active" // Optional - The name of the active field
}
}
}
example: service.model.js
module.exports = function (app) {
const modelName = 'api-keys';
const mongooseClient = app.get('mongooseClient');
const {Schema} = mongooseClient;
const schema = new Schema({
"api-key": {type: String, required: true},
revoked: {type: Boolean, default: false},
authorized: {type: Boolean, default: false},
active: {type: Boolean, default: true},
}, {
timestamps: true
});
// This is necessary to avoid model compilation errors in watch mode
// see https://mongoosejs.com/docs/api/connection.html#connection_Connection-deleteModel
if (mongooseClient.modelNames().includes(modelName)) {
mongooseClient.deleteModel(modelName);
}
return mongooseClient.model(modelName, schema);
};
Now just add x-api-key: "KEY HERE"
to your headers, and it should be authenicated.
Done.
0.0.1 - initial release
FAQs
API Key authentication strategy for @feathers/authentication
The npm package @dallin.b.johnson/authentication-api-key receives a total of 0 weekly downloads. As such, @dallin.b.johnson/authentication-api-key popularity was classified as not popular.
We found that @dallin.b.johnson/authentication-api-key demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.