
Research
Two Malicious Rust Crates Impersonate Popular Logger to Steal Wallet Keys
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
@heise/embetty-base
Advanced tools
[Embetty](https://github.com/heiseonline/embetty) displays remote content like tweets or YouTube videos without compromising your privacy. `embetty-base` is the API used to retrieve the necessary data.
Embetty displays remote content like tweets or YouTube videos without compromising your privacy. embetty-base
is the API used to retrieve the necessary data.
$ npm install @heise/embetty-base
or
$ yarn add @heise/embetty-base
const Embetty = require('@heise/embetty-base')
const embetty = new Embetty()
const tweet = await embetty.loadTweet(someStatusId)
By default, remote service responses are stored in an LRU cache. The engine can be selected by defining the environment variable EMBETTY_CACHE
. Example:
$ export EMBETTY_CACHE=redis://
$ yarn test
You can set the DEBUG
env to embetty.*
to print debug info:
$ export DEBUG=embetty.*
embetty-base is MIT licensed.
FAQs
[Embetty](https://github.com/heiseonline/embetty) displays remote content like tweets or YouTube videos without compromising your privacy. `embetty-base` is the API used to retrieve the necessary data.
The npm package @heise/embetty-base receives a total of 24 weekly downloads. As such, @heise/embetty-base popularity was classified as not popular.
We found that @heise/embetty-base demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.