
Product
Announcing Socket Certified Patches: One-Click Fixes for Vulnerable Dependencies
A safer, faster way to eliminate vulnerabilities without updating dependencies
@hazae41/alocer
Advanced tools
WebAssembly port of Base64, Base64URL, Base16, and Base58 encoding algorithms
WebAssembly port of Base64, Base64URL, Base16, and Base58 encoding algorithms
npm i @hazae41/alocer
Node Package 📦 • Deno Module 🦖 • Next.js CodeSandbox 🪣
You need to install Rust
Then, install wasm-pack
cargo install wasm-pack
Finally, do a clean install and build
npm ci && npm run build
You can build the exact same bytecode using Docker, just be sure you're on a linux/amd64 host
docker compose up --build
Then check that all the files are the same using git status
git status --porcelain
If the output is empty then the bytecode is the same as the one I commited
Each time I commit to the repository, the GitHub's CI does the following:
docker compose up --buildgit status --porcelain output is not emptyEach time I release a new version tag on GitHub, the GitHub's CI does the following:
npm diff between the cloned repository and the same version tag on NPMIf a version is present on NPM but not on GitHub, do not use!
FAQs
WebAssembly port of Base64, Base64URL, Base16, and Base58 encoding algorithms
The npm package @hazae41/alocer receives a total of 17 weekly downloads. As such, @hazae41/alocer popularity was classified as not popular.
We found that @hazae41/alocer demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
A safer, faster way to eliminate vulnerabilities without updating dependencies

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.