
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
@dxos/cli-ipfs
Advanced tools
CLI extension for IPFS operations.
dx ipfs start
command is used to start IPFS.
Optional --daemon
flag allows to start IPFS as a daemon, with enabled autorestart on fail and restart in case when memory limit exceeded.
In case of starting as a daemon, one need to make sure process has write access to log file, located by default at /var/log/ipfs.log
. Alternative location of the log file could be defined via optional --log-file
parameter.
By default, started IPFS node swarms with other DXOS IPFS nodes, bootstrapped from WNS. Interval of swarm connections could be defined with --connect-interval
(in seconds), default is 300
. WNS bootstrap could be turned on/off using --wns-bootstrap
flag, which is true
by default.
dx ipfs start --daemon --log-file "/tmp/ipfs.log"
In case when IPFS was started as a daemon, dx ipfs stop
command could be used for its stopping.
// TODO(egorgripasov): Not only for daemon case?
dx ipfs find
command is used to find file in IPFS nodes, both registered and not registred with WNS. Command requires IPFS node running locally.
Command supports lookup of app, bot or just hash, e.g.:
Hash lookup:
dx ipfs find QmWztwfX8JRepUZdbFF7ygJy1Bhfks33W7SocZnqzx2T4k
App lookup:
dx ipfs find app example.com/editor
Bot lookup: (resuires additional --platform
parameter)
dx ipfs find bot dxos.org/echo --platform macos-x64
FAQs
DXOS IPFS CLI
We found that @dxos/cli-ipfs demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 12 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.