Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
@exceptionless/node
Advanced tools
Using Exceptionless in the NodeJS environment is similar to using it in other JavaScript environments.
To use this package, your must be using ES6 and Node 18+.
npm install @exceptionless/node --save
While your app is starting up, you should call startup
on the Exceptionless
client. This ensures the client is configured and automatic capturing of
unhandled errors occurs.
import { Exceptionless } from "@exceptionless/node";
await Exceptionless.startup(c => {
c.apiKey = "API_KEY_HERE";
// set some default data
c.defaultData["mydata"] = {
myGreeting: "Hello World"
};
c.defaultTags.push("Example", "JavaScript", "Node");
});
Once that's done, you can use the Exceptionless client anywhere in your app by
importing Exceptionless
followed by the method you want to use. For example:
await Exceptionless.submitLog("Hello world!");
Please see the docs for more information on configuring the client.
For improved stack traces launch your Node app with the
--enable-source-maps
command line option.
node app.js --enable-source-maps
If you need help, please contact us via in-app support, open an issue or join our chat on Discord. We’re always here to help if you have any questions!
FAQs
JavaScript client for Exceptionless
We found that @exceptionless/node demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.