
Security News
Axios Maintainer Confirms Social Engineering Attack Behind npm Compromise
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.
@graffiticode/auth
Advanced tools
Auth application for Graffiticode applications.
uid: user id, in practice this is a non 0x prefixed ethereum address.GET /certsGets a JSON Web Key Set for the current set of keys being used to sign tokens.
noneGET /authenticate/ethereum/:addressReturns the current nonce for an ethereum address. This will generate a nonce if one does not currently exist.
noneaddress: used as the user idnonce: Opaque random string used for authenticating with ethereum.POST /authenticate/ethereum/:addressPerforms Sign In With Ethereum processing for an address. If authentication succeeds a accessToken and refreshToken are issued to the caller.
noneaddress: used as the user idsignature: signed ethereum message with contents "Nonce: <nonce>"accessToken: a short lived JWT that can be used to make authenticated calls to GC APIs (i.e. compilers or the API). This is optimization over the client having to call POST /authenticate/refresh_token.refreshToken: a long lived opaque token for retrieving auth accessTokens.POST /authenticate/refresh_tokenExchanges a refreshToken issued during authentication for a short lived JWT that can be used to make authenticated calls to the GC APIs.
nonerefreshToken: the token issued during authenticationaccessToken: a short lived JWT that can be used to make authenticated calls to GC APIs.npx firebase emulators:start
npm run dev
# Generate a signing key
curl -i -X POST http://localhost:4100/certs
node tools/run-ethereum.js
FAQs
Auth service for GC applications
We found that @graffiticode/auth demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.