Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
@kyve/core-beta
Advanced tools
@kyve/core
🚀 The base KYVE node implementation.
The KYVE protocol node is in general responsible for collecting data from various sources and submitting them for validation to the KYVE network. It does that by transforming the data, packaging it in bundles and storing them on permanent storage providers like Arweave, where other protocol nodes can retrieve and validate them for their correctness.
During all that time KYVE protocol nodes are communicating with the KYVE blockchain, a cosmos-sdk based PoS chain providing the main KYVE logic of registering bundle proposals and keeping track of votes.
The basic architecture of a protocol node can be found below:
Overview
A more detailed architecture overview of the data collection thread can be found below:
@kyve/core
runtime
. This is very application specificA more detailed architecture overview of the data indexing thread can be found below:
@kyve/core
runtime
. This is very application specificFAQs
🚀 The base KYVE node implementation.
We found that @kyve/core-beta demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.