Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@ensuro/extensions
Advanced tools
This package contains several extension / utility contracts to be used with the Ensuro Protocol.
Try running some of the following tasks:
npx hardhat help
npx hardhat test
GAS_REPORT=true npx hardhat test
The objective of this contract is to support the operation of some partners that receive the money of the premiums several weeks after the policy was sold. This contract lends the money to pay the premiums while keeping the ownership of the policies as collateral. When there's a payout, it retains the funds up to cover the debt and releases the remaining to a previously configured address.
This is an implementation of LPManualWhitelist with an additional endpoint that verifies a Quadrata passport before whitelisting a new provider.
The supported roles are:
LP_WHITELIST_ROLE
: Can whitelist providers bypassing quadrata's checkQUADRATA_WHITELIST_ROLE
: Can whitelist providers that have a quadrata passport with the required attributesLP_WHITELIST_ADMIN_ROLE
: Can change the contract settings and perform upgradesDEFAULT_ADMIN_ROLE
: Can grant roles to addressesCheckout Quadrata's docs for the available attributes.
Checkout the method _validateRequiredAttribute
for attributes with special validations.
FAQs
Extension contracts that operate with the Ensuro Protocol
We found that @ensuro/extensions demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.