
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
@eyevinn/hls-proxy
Advanced tools
Node library to intercept and proxy HLS requests.
With this library you can easily set up a proxy server to intercept and change the contents of an HLS manifest.
npm install --save @eyevinn/hls-proxy
Setup a proxy and provide request handlers.
const { HLSProxy } = require("@eyevinn/hls-proxy");
const proxy = new HLSProxy(handlers);
proxy.listen(process.env.PORT || 8000);
When a client requests a HLS to http://localhost:8000/example/master.m3u8
the following will happen:
/example/master.m3u8
from the proxyhandlers.originHandler(request)
is called is expected to return the base URL (ORIGINBASE
) for origin requests.<ORIGINBASE>/example/master.m3u
.handlers.masterManifestHandler()
is called with the parsed manifest as an m3u object. It is expected to return the manifest to be recevied by the client./example/2000/2000.m3u8
<ORIGINBASE>/example/2000/2000.m3u8
handlers.mediaManifestHandler()
is called with the parsed media manifest as an m3u object. The handler is expected to return the manifest for the client.segmentRedirectHandler()
is called and this handler is expected to return the URL to the segment. A 302 redirect to this URL is then sent to the client.const { HLSProxy } = require("@eyevinn/hls-proxy");
const proxy = new HLSProxy({
originHandler: async () => {
return "https://maitv-vod.lab.eyevinn.technology";
},
segmentRedirectHandler: async (request, baseUrl) => {
const redirectUrl = new URL(request.raw.url, baseUrl);
return redirectUrl.href;
}
});
proxy.listen(8000);
Point the video player to http://localhost:8000/VINN.mp4/master.m3u8
and it will fetch all manifests via the proxy and segment requests are redirected to https://maitv-vod.lab.eyevinn.technology
.
See examples/rewrite.js
for a working example where the segment URLs in the media manifest is rewritten to the origin URLs. And in examples/redirect.js
you find an example of a 302 redirect.
interface IHandlers {
originHandler: (request: IProxyRequest) => Promise<string>;
masterManifestHandler?: (request: IProxyRequest, baseUrl: URL, m3u: any) => Promise<string>;
mediaManifestHandler?: (request: IProxyRequest, baseUrl: URL, m3u: any) => Promise<string>;
segmentRedirectHandler?: (request: IProxyRequest, baseUrl: URL) => Promise<string>;
}
Eyevinn Technology is an independent consultant firm specialized in video and streaming. Independent in a way that we are not commercially tied to any platform or technology vendor.
At Eyevinn, every software developer consultant has a dedicated budget reserved for open source development and contribution to the open source community. This give us room for innovation, team building and personal competence development. And also gives us as a company a way to contribute back to the open source community.
Want to know more about Eyevinn and how it is to work here. Contact us at work@eyevinn.se!
FAQs
NPM library for proxying HLS requests
We found that @eyevinn/hls-proxy demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.