Security News
The Risks of Misguided Research in Supply Chain Security
Snyk's use of malicious npm packages for research raises ethical concerns, highlighting risks in public deployment, data exfiltration, and unauthorized testing.
@evolutionland/tron
Advanced tools
Evolution Land contracts on TRON network
当前波场测试网合约部署 已经部署
RING:
(base58) TKJd7ggBm6oPKbVo4wrWwkcvYD6XkGK24j
(hex) 4166652a35a84c95a0f265a760bb7de80a5c4f9d6e
KTON:
(base58) TNGCepjfv4TtabKL3JoGSPxGjW7wdvfXyR
(hex) 4186d84a1e3aa9a634654aa37bd94986a5ed598db4
HHO:
(base58) TZ7d8EZNgFREcNL66fmSmDsj4dJwb4t6fN
(hex) 41fde25bb212bd4db40dce601263dd94cab47056ea
FIRE:
(base58) TQYc5HYtsjqLPYLHU5Gu9yGjxmfbkimgaw
(hex) 419fe2bf7be04838e41ae087e37ce7f94cb0506f53
GOLD:
(base58) TSEfem7E3V88Z6nDSWzkndWtMxC5QCjK6e
(hex) 41b26e7f9095105e5a9b2f956e8c1d6c6474236f80
WOOD:
(base58) TFV8vsXFV9C7kggVxvNH6BKGzKb9z2zRtd
(hex) 413c81b55ed1c5107bd852cf36c36440a985b983e9
SIOO:
(base58) TRiJbVeFU8QHhq8HodKmHo7vSW2qdC3WGX
(hex) 41acb071489e27cef992558527a29018b4e475e1a8
TakeBack:
(base58) TA5B1EuwfvogDPhjGFbG6DqunDwFZxh1EE
(hex) 410120d430cfd225d1eb10d71c5cb41400fb49fd6d
FAQs
Evolution Land contracts on TRON network
We found that @evolutionland/tron demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Snyk's use of malicious npm packages for research raises ethical concerns, highlighting risks in public deployment, data exfiltration, and unauthorized testing.
Research
Security News
Socket researchers found several malicious npm packages typosquatting Chalk and Chokidar, targeting Node.js developers with kill switches and data theft.
Security News
pnpm 10 blocks lifecycle scripts by default to improve security, addressing supply chain attack risks but sparking debate over compatibility and workflow changes.