Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@living-room/service-js
Advanced tools
Creates a living room that you can connect to over HTTP, socket.io, and osc!
You can test it out by running npm start
after installing the dependencies with npm install
For motivations, context, and philosophy, check out https://github.com/living-room/living-room
For a nice javascript client, check out https://github.com/living-room/client-js
There is a git post-receive hook which we setup like so:
# on remote machine
git clone --bare https://github.com/living-room/service-js.git service-js.git
mkdir service-js
# on local machine
git remote add my-remote-machine ssh://my-remote-machine/home/livingroom/service-js.git
After deploying the default branch, the post-receive hook checks it out and restarts the system service. neat.
$ curl -d 'facts=curl is an app at (20, 30)' localhost:3000/assert
OK
$ curl -d 'facts=$who is an app at ($x, $y)' localhost:3000/select
{"assertions":[{"who":{"word":"curl"},"x":{"value":20},"y":{"value":30}}]}%
npm run serve:examples && open http://localhost:5000
const socket = io.connect(`http://localhost:3000`)
// The pattern we want to match on
const pattern = 'ping $number'
let pong = 0
// To subscribe pass in the JSON of an array of patterns
const patternsString = JSON.stringify([pattern])
// We will get back an object, we just care about new assertions
socket.on(patternsString, ({assertions}) => {
assertions.forEach(({number}) => {
const value = parseInt(number.value)
if (value > pong) pong = value
console.log(`<- pong ${pong}`)
pong++
})
})
socket.emit('subscribe', patternsString)
// Start pinging from highest previous ping
setInterval(() => {
socket.emit('assert', `ping ${pong}`, data => {
console.log(`-> ${data[0]}`)
})
}, 1500)
from examples/osc/osc.pde
/**
* based off of oscP5message by andreas schlegel
* oscP5 website at http://www.sojamo.de/oscP5
*/
import oscP5.*;
import netP5.*;
OscP5 oscP5;
NetAddress myRemoteLocation;
void setup() {
size(400,400);
frameRate(25);
oscP5 = new OscP5(this, 12000);
myRemoteLocation = new NetAddress("127.0.0.1",41234);
}
void draw() {
background(0);
}
void mousePressed() {
OscMessage assertMessage = new OscMessage("/assert");
assertMessage.add("processing is a program at (0.2, 0.3)");
oscP5.send(assertMessage, myRemoteLocation);
OscMessage assert2Message = new OscMessage("/assert");
assert2Message.add("coolprocessing is a notherprogram at (0.4, 0.4)");
oscP5.send(assert2Message, myRemoteLocation);
OscMessage selectMessage = new OscMessage("/select");
selectMessage.add("$name is a $type at ($x, $y)");
oscP5.send(selectMessage, myRemoteLocation);
}
FAQs
http, eventstream, socketio, and osc server for livingroom
We found that @living-room/service-js demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.