
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
@keypom/one-click-connect
Advanced tools
Keypom OneClick Connect is a package that allows apps to bypass the NEAR wallet selector modal and instantly sign users with the click of a button.
OneClick Connect is a great way to reduce friction for users signing into applications. Currently, the sign in flow for a new user is as follows:
As NEAR pushes to abstract crypto complexities away from the end user, this approach is not scalable. Not only are there a lot of clicks and redirects, leading to a loss in user retention, but people must also know which wallet they own. This is a big problem for apps like Sweatcoin, where the wallet logic is hidden from the user.
The flow that OneClick Connect offers is as follows:
This flow is much more seamless and removes all the redirects and wallet selector modal friction.
To install the plugin, run the following command:
npm install @keypom/one-click-connect
# or
yarn add @keypom/one-click-connect
# or
pnpm add @keypom/one-click-connect
Apps on NEAR should be compatible with the official wallet selector plugin to enable signing and sending transactions. Like Mintbase Wallet, MyNEARWallet, Meteor Wallet etc, OneClick Connect is a simple module for the wallet selector. This means that all you need to do is install the plugin and add its setup function to the wallet selector exactly as you would do with any other wallet.
To get started, navigate to the app's setupWalletSelector
code where the selector is initialized. Here, you can specify which wallet modules your app should support. Simply import and add OneClick Connect's setupOneClickConnect
function to the list of modules and you're good to go!
import { setupOneClickConnect } from '@keypom/one-click-connect';
const selector = await setupWalletSelector({
network: "testnet",
modules: [
setupMyNearWallet(),
...,
setupSender(),
// Add the OneClick Connect function here
setupOneClickConnect({
networkId: "testnet",
contractId: "guestbook.near-examples.testnet",
methods: ["add_message"], // Optional, defaults to any methods ["*"]
allowance: "250000000000000000000000" // Optional, access key allowance in Yocto, defaults to 1 NEAR
})
],
});
networkId
: Either testnet
or mainnet
.contractId
: Specifies the contract that the limited access key is capable of calling.methods
(Optional): This controls what methods any limited access keys added will be able to call. Defaults to all methods.allowance
(Optional): Outlines the allowance for any limited access keys added. This defaults to 1 NEAR.The OneClick Connect experience will trigger on any page that matches the following URL pattern:
"http://app.example.com/?connection=tbin329...adwe0vjer"
The string following ?connection=
is a base64 encoded stringified JSON containing connection information. This JSON can be seen below:
connection = {
accountId: string,
walletId: string,
walletTransactionUrl: string | undefined,
chainId: string | undefined,
secretKey: string | undefined,
};
accountId
: The account being signed into the destination dApp.walletId
: ID of the wallet being used. For example, sweat-wallet
.walletTransactionUrl
: This is the URL for a wallet signing transactions.chainId
: Destination chain for the sign in, defaults to NEAR.secretKey
: The secret key for signing transactions on the destination dApp. If undefined, OneClick will try to add it along with the first transaction the user signs.Any malformed string following ?connection=
that cannot be base64 decoded and JSON stringified will lead to a failed login.
In the development of OneClick, it became apparent that exposing a secret key in the URL could pose a security concern in certain scenarios. For example, if the limited access key was meant to cast a vote in a DAO, then it would be imparative that the key is not exposed in order to ensure the integrity of the vote. This led to the creation of two flows, depending on your security needs.
The first approach is the less secure method, directly exposing the secret key in the URL. The compromise in security grants you a smoother user experience. The flow is as follows:
The second approach is more secure but includes an extra step. Rather than dApp A creating a limited access key before redirecting, this occurs when the user attempts to sign the first transaction on dApp B:
Apps can utilize OneClick Connect on any page by ensuring the URL contains the ?connection=
parameter. For instance:
"http://app.example.com/?connection=tbin329...adwe0vjer"
will automatically trigger the sign-in process using the provided connection object.Similarly, this would also trigger on "http://app.example.com/nestedPage/gallery?connection=tbin329...adwe0vjer"
Behind the scenes, Keypom will take the secret key and use it to sign transactions on behalf of the account whenever they perform an action. Since this key is limited access, there needs to be a way to approve any transaction that requires full access. This is why the :walletId
field is present. This is the ID of the wallet that the user will be redirected to in order to approve any full access key required transactions.
Currently, Keypom supports:
sweat-wallet
my-near-wallet
,mintbase-wallet
,First off, thanks for taking the time to contribute! Contributions are what makes the open-source community such an amazing place to learn, inspire, and create. Any contributions you make will benefit everybody else and are greatly appreciated.
Please try to create bug reports that are:
You can use markdownlint-cli to check for common markdown style inconsistency.
This project is licensed under the GPL License.
FAQs
OneClick Connect Wallet Selector Plugin
We found that @keypom/one-click-connect demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.