
Security News
/Research
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
@getlazy/faas-pipeline
Advanced tools
Complex OpenFaaS function composition
faas-pipeline offers executing of complex pipelines on top of OpenFaaS. It does this by:
faas-pipeline can:
~split
. The result of ~split
operation is an array of results of all functions that were executed concurrently.~pipe
. ~pipe
operation results in a new payload based on its received payload.These can be combined in any number of ways. For example:
pipeline:
~pipe:
- ~split: # sends the received payload into fn1, fn2 and fn3
fn1:
fn2:
fn3:
- some-merging-fn: # this function acts on array of results from fn1, fn2 and fn3 with parameters of whatever1 and whatever2
some-param: whatever1
another-param: whatever2
Each compatible function must:
payload
and params
properties.error
or result
property and optional metrics
property.Execution stops on first error or when the entire pipeline has ran. Pipeline run thus either results in a free-form result or in a free-form error.
FAQs
OpenFaaS function composition
The npm package @getlazy/faas-pipeline receives a total of 0 weekly downloads. As such, @getlazy/faas-pipeline popularity was classified as not popular.
We found that @getlazy/faas-pipeline demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.