
Security News
PodRocket Podcast: Inside the Recent npm Supply Chain Attacks
Socket CEO Feross Aboukhadijeh discusses the recent npm supply chain attacks on PodRocket, covering novel attack vectors and how developers can protect themselves.
@dazn/chaos-squirrel-attack-disk-space
Advanced tools
Chaos Squirrel attack to consume/fill disk space
Consume lots of disk space. Spawns a dd
process, so this is unlikely to work on non-unix systems.
Note that AWS Lambda functions have 512 MB disk space available.
import DiskSpaceAttack from '@dazn/chaos-squirrel-attack-disk-space';
const createDiskSpaceAttack = DiskSpaceAttack.configure({
// 2gb
size: 2000000000,
});
const diskSpaceAttack = createDiskSpaceAttack();
// Start and stop methods are async for this attack.
// You should await the results to ensure the file is fully created + removed
await diskSpaceAttack.start();
// a 2gb file will be created
await diskSpaceAttack.stop(); // deletes the file
0.10.1 (2021-07-20)
Note: Version bump only for package @dazn/chaos-squirrel
FAQs
Chaos Squirrel attack to consume/fill disk space
We found that @dazn/chaos-squirrel-attack-disk-space demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 7 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Socket CEO Feross Aboukhadijeh discusses the recent npm supply chain attacks on PodRocket, covering novel attack vectors and how developers can protect themselves.
Security News
Maintainers back GitHub’s npm security overhaul but raise concerns about CI/CD workflows, enterprise support, and token management.
Product
Socket Firewall is a free tool that blocks malicious packages at install time, giving developers proactive protection against rising supply chain attacks.