
Research
/Security News
Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader
North Korean threat actors deploy 67 malicious npm packages using the newly discovered XORIndex malware loader.
@highnoteplatform/card-viewer
Advanced tools
Note: This library is in a pre-release phase. Prior to the release of version
1.0.0
, breaking changes may be introduced.
The Highnote Card Viewer library allows you to embed sensitive card data in your UI seamlessly using iframes. This allows you to avoid PCI-scoped data flowing through your servers or being accessible to scripts running on your page. You can either render card data as individual fields or render a customized card image (coming soon).
Note: Read the full documentation here.
With npm:
npm i @highnoteplatform/card-viewer
With yarn:
yarn add @highnoteplatform/card-viewer
On your server, generate a client token using the GraphQL API.
See the generatePaymentCardClientToken docs.
GraphQL query
mutation GeneratePaymentCardClientToken(
$input: GeneratePaymentCardClientTokenInput!
) {
generatePaymentCardClientToken(input: $input) {
... on ClientToken {
value
expirationDate
}
}
}
Input variables
{
"input": {
"paymentCardId": "MC43LjE=",
"permissions": ["READ_RESTRICTED_DETAILS"]
}
}
Response
{
"data": {
"generatePaymentCardClientToken": {
"value": "TOKEN",
"expirationDate": "2022-02-07T20:04:50.633Z"
}
},
"extensions": {
"requestId": "example-request-id"
}
}
You will need to provide the Card Viewer with the elements you want to render iframes into for each field.
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8" />
<meta http-equiv="X-UA-Compatible" content="IE=edge" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<title>Payment Card</title>
</head>
<body>
<p>Card Number</p>
<div id="cardNumber">
<!-- An iframe will be injected here -->
</div>
<p>CVV</p>
<div id="cvv">
<!-- An iframe will be injected here -->
</div>
<p>Expiration Date</p>
<div id="expirationDate">
<!-- An iframe will be injected here -->
</div>
</body>
</html>
import { renderFields } from "@highnoteplatform/card-viewer";
const { unmount } = await renderFields({
clientToken: "client token from server",
// This is the same paymentCardId used to generate the token
paymentCardId: "MC43LjE=",
// This allows a user to click and copy the value of a field. Enabled by default
enableClipboard: true,
// Only needed is clipboard is enabled
onCopyToClipboardSuccess: ({ field }) => {
console.log(`${field} value copied!`); // cardNumber value copied!
},
onError: (error) => {
// Handle errors
},
// Specify the individual fields to render data into
elements: {
cardNumber: {
selector: "#cardNumber",
},
cvv: {
selector: "#cvv",
// Example style payload allowing customization of the given field.
styles: {
color: "black",
fontFamily: "monospace",
cursor: "pointer",
fontWeight: "medium",
fontSize: "1rem",
":hover": {
backgroundColor: "rgba(0, 0, 0, .2)",
},
},
expirationDate: {
selector: "#expirationDate",
},
},
});
FAQs
Render a payment card in your UI.
The npm package @highnoteplatform/card-viewer receives a total of 1,393 weekly downloads. As such, @highnoteplatform/card-viewer popularity was classified as popular.
We found that @highnoteplatform/card-viewer demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
North Korean threat actors deploy 67 malicious npm packages using the newly discovered XORIndex malware loader.
Security News
Meet Socket at Black Hat & DEF CON 2025 for 1:1s, insider security talks at Allegiant Stadium, and a private dinner with top minds in software supply chain security.
Security News
CAI is a new open source AI framework that automates penetration testing tasks like scanning and exploitation up to 3,600× faster than humans.