Security News
How Threat Actors are Abusing GitHub’s File Upload Feature to Host Malware
GitHub is susceptible to a CDN flaw that allows attackers to host malware on any public repository.
@loftx/twitter-graph-api
Advanced tools
A very basic node module to interact with the internal Twitter Graph API
Readme
A very basic node module to interact with the internal Twitter Graph API (i.e. the one used on the Twitter web site at https://twitter.com/) not the publically available API at https://developer.twitter.com/
Due to changes, version 2.0.0 no longer allows guest authentiction, but requires specific credentials to be set.
Create the API instance
const twitter = new twitterGraphApi();
Obtain a CSRF token, Cookie and Barer token - these can be grabbed from a the XHR request starting https://twitter.com/i/api/graphql/H8OOoI-5ZE4NxgRr8lfyWg/UserTweets as a logged in user.
twitter.setCsrfToken(...); twitter.setBearerToken(...); twitter.setCookie(...);
Call getUserTweets with a twitter UserID (the numeric ID not the username)
const result = await twitter.getUserTweets(twitterUserID);
The full graph API result will be returned.
FAQs
A very basic node module to interact with the internal Twitter Graph API
The npm package @loftx/twitter-graph-api receives a total of 0 weekly downloads. As such, @loftx/twitter-graph-api popularity was classified as not popular.
We found that @loftx/twitter-graph-api demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
GitHub is susceptible to a CDN flaw that allows attackers to host malware on any public repository.
Security News
At Node Congress, Socket CEO Feross Aboukhadijeh uncovers the darker aspects of open source, where applications that rely heavily on third-party dependencies can be exploited in supply chain attacks.
Research
Security News
The Socket Research team found this npm package includes code for collecting sensitive developer information, including your operating system username, Git username, and Git email.