Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@datawheel/bespoke
Advanced tools
# Bespoke
REPORTS_DB_CONNECTION="postgres://user:@localhost:5432/database"
REPORTS_LOGGING=true
NEXT_PUBLIC_REPORTS_LOCALE_DEFAULT="en"
NEXT_PUBLIC_REPORTS_LOCALES="en,es"
REPORTS_BASE_URL="http://localhost:3000"
# Images
NEXT_PUBLIC_IMAGE_SPLASH_WIDTH=1400
NEXT_PUBLIC_IMAGE_THUMB_WIDTH=400
# Providers
NEXT_PUBLIC_IMAGE_PROVIDERS="upload,local,flickr,unsplash,adobe"
FLICKR_API_KEY="xxxx"
UNSPLASH_API_KEY="xxxx"
# unused ADOBE_STOCK_API_KEY="xxxx"
# unused ADOBE_STOCK_API_SECRET="xxxx"
# unused ADOBE_MANAGEMENT_API_KEY="xxxx"
# unused ADOBE_MANAGEMENT_API_SECRET="xxxx"
# Auth
AUTH0_SECRET="xxxxxxxxxxxxxxxxxxxxxxxxx"
AUTH0_BASE_URL="http://localhost:3000"
AUTH0_ISSUER_BASE_URL="https://xxxxxxx.auth0.com"
AUTH0_CLIENT_ID="xxxxxxxxxxx"
AUTH0_CLIENT_SECRET="xxxxxxxxxxx"
# Timeout
NEXT_PUBLIC_REPORTS_API_FETCH_TIMEOUT=100000
Just add this in your nextjs.config.js
publicRuntimeConfig: {
// Define your public environment variables for bespoke here
bespoke_report_env_vars: {
API: process.env.NEXT_PUBLIC_API || "N/A"
WHATEVER: "hello"
},
// ...
},
And is gonna be offered as ENV_API and ENV_WHATEVER in the list of variables in the profile.
FAQs
Content management system for creating automated data reports
The npm package @datawheel/bespoke receives a total of 141 weekly downloads. As such, @datawheel/bespoke popularity was classified as not popular.
We found that @datawheel/bespoke demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.