
Security News
Axios Maintainer Confirms Social Engineering Attack Behind npm Compromise
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.
Generates various ids for certain situations. Random strings are generated using random-js under the hood. All ids consist of the 62 "safest" characters
0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
const Ids = require('@ennis/id');
let id = Ids.short();
8-9 characters long. Checks for collisions with already generated ids in order to guarantee uniqueness. Will probably run into problems if you are generating more than ~10,000 ids per second (238328 possible per second). Appropriate in many cases. Date becomes 6 characters (9 total) in 2048.
Y o g 1 O M E L
----- 3 random characters
---------- 5-6 characters for date in seconds
11 characters long. Checks for collisions with already generated ids in order to guarantee uniqueness. Gives a little bit more room to avoid collisions. 14776336 possible ids every centisecond.
j X b q 2 K P 0 W n h
------- 4 random characters
------------- 7 characters for date in 1/100 seconds
14 characters long. Does not check for collisions. Is an attempt at creating unique ids across devices. Id has 1/million chance to collide if generated at the same miliseond as another id.
w B p k V r y e 9 p K J 2
--------- 5 random characters
---------------- 8 characters for date in miliseconds
A glorified obfuscation of an index count. 4 characters minimum. Index is optional. has obfuscateIndex() alias.
3 H 0 4
--- 2 random characters
--- base 62 representation of index
Creates a random string consisting of the 62 safe characters at the given length.
FAQs
ID generation
We found that @ennis/id demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.