Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
@datafire/6_dot_authentiqio_appspot
Advanced tools
Client library for Authentiq
npm install --save @datafire/6_dot_authentiqio_appspot
let dot_authentiqio_appspot = require('@datafire/6_dot_authentiqio_appspot').create();
dot_authentiqio_appspot.key_revoke_nosecret({
"email": "",
"phone": ""
}).then(data => {
console.log(data);
});
Strong authentication, without the passwords.
Revoke an Authentiq ID using email & phone.
If called with email
and phone
only, a verification code
will be sent by email. Do a second call adding code
to
complete the revocation.
dot_authentiqio_appspot.key_revoke_nosecret({
"email": "",
"phone": ""
}, context)
object
string
: primary email associated to Key (ID)string
: primary phone number, international representationstring
: verification code sent by emailobject
string
: pending or doneRegister a new ID JWT(sub, devtoken)
v5: JWT(sub, pk, devtoken, ...)
See: https://github.com/skion/authentiq/wiki/JWT-Examples
dot_authentiqio_appspot.key_register({
"body": null
}, context)
object
object
string
: revoke keystring
: registeredRevoke an Identity (Key) with a revocation secret
dot_authentiqio_appspot.key_revoke({
"PK": "",
"secret": ""
}, context)
object
string
: Public Signing Key - Authentiq ID (43 chars)string
: revokation secretobject
string
: doneGet public details of an Authentiq ID.
dot_authentiqio_appspot.key.PK.get({
"PK": ""
}, context)
object
string
: Public Signing Key - Authentiq ID (43 chars)object
string
string
string
: base64safe encoded public signing keyHEAD info on Authentiq ID
dot_authentiqio_appspot.key.PK.head({
"PK": ""
}, context)
object
string
: Public Signing Key - Authentiq ID (43 chars)Output schema unknown
update properties of an Authentiq ID. (not operational in v4; use PUT for now)
v5: POST issuer-signed email & phone scopes in a self-signed JWT
See: https://github.com/skion/authentiq/wiki/JWT-Examples
dot_authentiqio_appspot.key_update({
"PK": "",
"body": null
}, context)
object
string
: Public Signing Key - Authentiq ID (43 chars)object
string
: confirmedUpdate Authentiq ID by replacing the object.
v4: JWT(sub,email,phone)
to bind email/phone hash;
v5: POST issuer-signed email & phone scopes
and PUT to update registration JWT(sub, pk, devtoken, ...)
See: https://github.com/skion/authentiq/wiki/JWT-Examples
dot_authentiqio_appspot.key_bind({
"PK": "",
"body": null
}, context)
object
string
: Public Signing Key - Authentiq ID (43 chars)object
string
: confirmedpush sign-in request See: https://github.com/skion/authentiq/wiki/JWT-Examples
dot_authentiqio_appspot.push_login_request({
"body": null,
"callback": ""
}, context)
object
string
: URI App will connect toobject
string
: sentscope verification request See: https://github.com/skion/authentiq/wiki/JWT-Examples
dot_authentiqio_appspot.sign_request({
"body": null
}, context)
object
integer
: test only mode, using test issuerobject
string
: 20-character IDstring
: waitingdelete a verification job
dot_authentiqio_appspot.sign_delete({
"job": ""
}, context)
object
string
: Job ID (20 chars)object
string
: doneget the status / current content of a verification job
dot_authentiqio_appspot.sign_retrieve({
"job": ""
}, context)
object
string
: Job ID (20 chars)object
integer
string
string
: base64safe encoded public signing keyHEAD to get the status of a verification job
dot_authentiqio_appspot.sign_retrieve_head({
"job": ""
}, context)
object
string
: Job ID (20 chars)Output schema unknown
this is a scope confirmation
dot_authentiqio_appspot.sign_confirm({
"job": ""
}, context)
object
string
: Job ID (20 chars)object
string
: confirmedauthority updates a JWT with its signature See: https://github.com/skion/authentiq/wiki/JWT-Examples
dot_authentiqio_appspot.sign_update({
"job": ""
}, context)
object
string
: Job ID (20 chars)object
string
: result is JWT or JSON??string
: readyobject
: Authentiq ID in JWT format, self-signed.
string
: device token for push messagesstring
: UUID and public signing keyobject
: Claim in JWT format, self- or issuer-signed.
string
string
string
: claim scopestring
: UUIDstring
object
string
integer
string
string
: unique uri for this errorobject
: PushToken in JWT format, self-signed.
string
: audience (URI)integer
integer
string
: issuer (URI)integer
string
: UUID and public signing keyFAQs
DataFire integration for Authentiq
The npm package @datafire/6_dot_authentiqio_appspot receives a total of 15 weekly downloads. As such, @datafire/6_dot_authentiqio_appspot popularity was classified as not popular.
We found that @datafire/6_dot_authentiqio_appspot demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.