
Security News
/Research
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
@jolocom/cbas
Advanced tools
In order to show how the CBAS module can be used in the context of an example use case, a set of tests were written and included in the repository. These tests showcase the currently supported API, and serve as a good example of how a developer would use
In order to show how the CBAS module can be used in the context of an example use case, a set of tests were written and included in the repository. These tests showcase the currently supported API, and serve as a good example of how a developer would use the CBAS library to implement authorization for their use case.
We first show how an instance of the CBAS library can be used to issue capabilities authorizing the holder to perform some actions on certain resources. The tests for getGrantsForCapability
and canGrantPrivilege
further show how the issued capability can be evaluated against a governance framework document (specifically the SGL statements in the rules
section) to grant certain defined privileges.
These useful helpers can aid the client in finding the appropriate capabilities for a request, and the server in evaluating / verifying received capabilities. The rest of the tests focus on the evaluateCapability
and evaluateInvocation
functions, which can be used to verify the signature and expiry date on a capability / invocation, and evaluate it against the rules
defined in the governance framework.
FAQs
In order to show how the CBAS module can be used in the context of an example use case, a set of tests were written and included in the repository. These tests showcase the currently supported API, and serve as a good example of how a developer would use
We found that @jolocom/cbas demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.