
Research
/Security News
Weaponizing Discord for Command and Control Across npm, PyPI, and RubyGems.org
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
@hashicorp/hashi-footer
Advanced tools
HashiCorp's global footer.
The footer in it's current state is completely static, with no content coming from Dato. This may be changed in the future depending on the frequency of update requests.
A number of svg icons are used throughout the footer component. Each has been wrapped in a component and placed in one of the following directories:
logos
- icons for HashiCorp or product logossocial
- icons for social media platformsAlthough the footer component will be used across the majority of HashiCorp web properties, all footer links point to the .com website. Therefore, the href
attribute for all links must be an absolute url pointing to the appropriate page at https://www.hashicorp.com
.
Each link has a data-ga-footer
attribute added to it. The value of this attribute is structured as Section | Link Label
. For example: `data-ga-footer="Products | Terraform".
Click event tracking is currently handled at the application level, as seen here: https://github.com/hashicorp/hashicorp-www-middleman/blob/9e2803fd7ad8111bbeefdadc147377cabad20144/assets/js/analytics.js#L63
FAQs
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
Security News
Socket now integrates with Bun 1.3’s Security Scanner API to block risky packages at install time and enforce your organization’s policies in local dev and CI.
Research
The Socket Threat Research Team is tracking weekly intrusions into the npm registry that follow a repeatable adversarial playbook used by North Korean state-sponsored actors.