Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@iota/transaction-converter
Advanced tools
Converts transaction trytes to transaction objects and back.
Methods for calculating transaction hashes and converting transaction objects to transaction trytes and back.
Install using npm:
npm install @iota/transaction-converter
or using yarn:
yarn add @iota/transaction-converter
Param | Type | Description |
---|---|---|
transactions | Transaction | Array.<Transaction> | Transaction object(s) |
Converts a transaction object or a list of those into transaction trytes.
Returns: Trytes
| Array.<Trytes>
- Transaction trytes
Param | Type | Description |
---|---|---|
trytes | Trytes | Transaction trytes |
Converts transaction trytes of 2673 trytes into a transaction object.
Returns: Transaction
- Transaction object
Param | Type | Description |
---|---|---|
[hashes] | Array.<Hash> | Optional list of known hashes. Known hashes are directly mapped to transaction objects, otherwise all hashes are being recalculated. |
Converts a list of transaction trytes into list of transaction objects. Accepts a list of hashes and returns a mapper. In cases hashes are given, the mapper function map them to converted objects.
Returns: function
- transactionObjectsMapper
Param | Type | Description |
---|---|---|
trytes | Array.<Trytes> | List of transaction trytes to convert |
Maps the list of given hashes to a list of converted transaction objects.
Returns: Array.<Transaction>
- List of transaction objects with hashes
FAQs
Converts transaction trytes to transaction objects and back.
We found that @iota/transaction-converter demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 6 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.