Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
@datafire/6_dot_authentiqio_appspot
Advanced tools
Client library for Authentiq
npm install --save datafire @datafire/6_dot_authentiqio_appspot
let datafire = require('datafire');
let 6_dot_authentiqio_appspot = require('@datafire/6_dot_authentiqio_appspot').actions;
let context = new datafire.Context();
6_dot_authentiqio_appspot.key.delete({}, context).then(data => {
console.log(data);
})
Revoke an Authentiq ID using email & phone.
If called with email
and phone
only, a verification code
will be sent by email. Do a second call adding code
to
complete the revocation.
6_dot_authentiqio_appspot.key.delete({
"email": "",
"phone": ""
}, context)
Register a new ID JWT(sub, devtoken)
v5: JWT(sub, pk, devtoken, ...)
See: https://github.com/skion/authentiq/wiki/JWT-Examples
6_dot_authentiqio_appspot.key.post({
"body": null
}, context)
Revoke an Identity (Key) with a revocation secret
6_dot_authentiqio_appspot.key.PK.delete({
"PK": "",
"secret": ""
}, context)
Get public details of an Authentiq ID.
6_dot_authentiqio_appspot.key.PK.get({
"PK": ""
}, context)
HEAD info on Authentiq ID
6_dot_authentiqio_appspot.key.PK.head({
"PK": ""
}, context)
update properties of an Authentiq ID. (not operational in v4; use PUT for now)
v5: POST issuer-signed email & phone scopes in a self-signed JWT
See: https://github.com/skion/authentiq/wiki/JWT-Examples
6_dot_authentiqio_appspot.key.PK.post({
"PK": "",
"body": null
}, context)
Update Authentiq ID by replacing the object.
v4: JWT(sub,email,phone)
to bind email/phone hash;
v5: POST issuer-signed email & phone scopes
and PUT to update registration JWT(sub, pk, devtoken, ...)
See: https://github.com/skion/authentiq/wiki/JWT-Examples
6_dot_authentiqio_appspot.key.PK.put({
"PK": "",
"body": null
}, context)
push sign-in request See: https://github.com/skion/authentiq/wiki/JWT-Examples
6_dot_authentiqio_appspot.login.post({
"body": null,
"callback": ""
}, context)
scope verification request See: https://github.com/skion/authentiq/wiki/JWT-Examples
6_dot_authentiqio_appspot.scope.post({
"body": null
}, context)
delete a verification job
6_dot_authentiqio_appspot.scope.job.delete({
"job": ""
}, context)
get the status / current content of a verification job
6_dot_authentiqio_appspot.scope.job.get({
"job": ""
}, context)
HEAD to get the status of a verification job
6_dot_authentiqio_appspot.scope.job.head({
"job": ""
}, context)
this is a scope confirmation
6_dot_authentiqio_appspot.scope.job.post({
"job": ""
}, context)
authority updates a JWT with its signature See: https://github.com/skion/authentiq/wiki/JWT-Examples
6_dot_authentiqio_appspot.scope.job.put({
"job": ""
}, context)
FAQs
DataFire integration for Authentiq
The npm package @datafire/6_dot_authentiqio_appspot receives a total of 15 weekly downloads. As such, @datafire/6_dot_authentiqio_appspot popularity was classified as not popular.
We found that @datafire/6_dot_authentiqio_appspot demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.