
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
@dataunions/default-join-server
Advanced tools
A join server that extends the base join server by adding app secret validation and Streamr-awareness
A Data Union join server that imports the base join server and extends it by adding app join request validation based on app secrets stored in MySQL. The join server also supports granting access to Streamr streams when a member joins a Data Union that uses Streamr on the data transport layer.
An instance of this join server is run by the Data Union DAO to make it easier for Data Union builders to get started and control access to the Data Unions. Note that you can fork this join server and customize it to your needs, for example to implement additional validation for join requests or take some different action when after members join.
.env file containing database configs and the private key of a permitted joinPartAgent for your Data Union (see .env.template in the repo)npm install -g @dataunions/default-join-serverdefault-join-serverThe join request payloads are expected to contain an additional key secret, containing a valid app secret previously added to the data union via the /secrets/create endpoint.
An example join request:
{
dataUnion: '0x12345',
chain: 'polygon',
secret: 'the-random-secret',
}
Note that as with the base server, the join request is expected to be wrapped in the signature wrapper:
{
"address": "0xabcdef",
"request": "{\"dataUnion\":\"0x12345\",\"chain\":\"polygon\",\"secret\":\"the-random-secret\"}",
"timestamp": "...",
"signature": "..."
}
For more information about the signature authentication, refer to the readme in the base join server.
The server adds three HTTP endpoints, callable by the DU admin only, to manage the app secrets. All requests are wrapped in the signature wrapper, but for clarity only the (non-stringified) request are illustrated here.
POST /secrets/createCreates a new secret for a given Data Union. Example request payload:
{
"dataUnion": "0x12345",
"chain": "polygon",
"name": "A human-readable label for the new secret"
}
The response contains the generated secret:
{
"secret": "0fc6b4d6-6558-4c04-b42e-49a8ae5b5ebf",
"dataUnion": "0x12345",
"chain": "polygon",
"name": "A human-readable label for the new secret"
}
POST /secrets/listLists the secrets attached to the given Data Union. Example request payload:
{
"dataUnion": "0x12345",
"chain": "polygon"
}
The response contains an array of secrets:
[{
"secret": "0fc6b4d6-6558-4c04-b42e-49a8ae5b5ebf",
"dataUnion": "0x12345",
"chain": "polygon",
"name": "A human-readable label for the new secret"
}]
POST /secrets/deleteDeletes a secret attached to the given Data Union. Example request payload:
{
"dataUnion": "0x12345",
"chain": "polygon",
"secret": "0fc6b4d6-6558-4c04-b42e-49a8ae5b5ebf"
}
The response returns the deleted secret:
{
"secret": "0fc6b4d6-6558-4c04-b42e-49a8ae5b5ebf",
"dataUnion": "0x12345",
"chain": "polygon",
"name": "A human-readable label for the deleted secret"
}
See create_tables.sql for the SQL to create the database table for the secrets.
After successfully adding a new member to the Data Union smart contract, this join server checks whether there are any Streamr streams associated with the Data Union, and grants the new member publish permission on those streams.
If you're using a different data protocol/backend, you should customize this behavior and grant access to your specific data backend to your new DU members (unless of course your backend accepts data from anyone, not just DU members).
FAQs
A join server that extends the base join server by adding app secret validation and Streamr-awareness
We found that @dataunions/default-join-server demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.