Research
Security News
Malicious PyPI Package ‘pycord-self’ Targets Discord Developers with Token Theft and Backdoor Exploit
Socket researchers uncover the risks of a malicious Python package targeting Discord developers.
@ifings/api-client
Advanced tools
iFings API client
This package provides a lightweight wrapper around the iFings API to allow for easy consumption on the frontend projects. It is currently being used by:
import api from '@ifings/api-client'
api.licences.licenceLearnerCount(clientId).then(console.log).catch(console.error)
For more information, please see the Docs directory.
This project uses node and npm.
$ npm install @ifings/api-client
$ # OR
$ yarn add @ifings/api-client
This module uses the Automated releases for npm packages Github action for releasing when pushed to the master
branch.
package.json
version? See the Script does not update package.json issuegit checkout -b my-new-feature
git commit -am "Add some feature"
git push origin my-new-feature
FAQs
iFings API client
The npm package @ifings/api-client receives a total of 50 weekly downloads. As such, @ifings/api-client popularity was classified as not popular.
We found that @ifings/api-client demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover the risks of a malicious Python package targeting Discord developers.
Security News
The UK is proposing a bold ban on ransomware payments by public entities to disrupt cybercrime, protect critical services, and lead global cybersecurity efforts.
Security News
Snyk's use of malicious npm packages for research raises ethical concerns, highlighting risks in public deployment, data exfiltration, and unauthorized testing.