
Research
SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains
An emerging npm supply chain attack that infects repos, steals CI secrets, and targets developer AI toolchains for further compromise.
@meframe/server
Advanced tools
Server-side exporter for @meframe/core (browser-driven, multipart upload via injected store)
@meframe/server is a Node.js package that runs @meframe/core export inside a real Chromium instance (via browser automation) and uploads the output using an injected multipart store interface.
Experimental, but functional.
Current capabilities:
@meframe/core export in a real Chromium instance (via puppeteer-core)Blob in Node memory)AbortSignal) and progress callback (onProgress)See:
packages/server/examples/README.md for example usage (local + S3)packages/server/docs/INTEGRATION.md for a complete integration guide (Chinese)packages/server/docs/ARCHITECTURE.md for architecture and constraintsMultipartObjectStore.Blob to Node; stream mux output into multipart parts.@meframe/core export flow (OPFS + WebCodecs + workers).ServerExporter
exportToStore({ model, exportOptions, pageUrl?, key?, metadata?, abortSignal? })Types are exported from @meframe/server root entry.
puppeteer-core internally, so production must provide a Chromium/Chrome binary and pass browser.executablePath when creating ServerExporter (or load it from your own config system).http://127.0.0.1 or https://...) via pageUrl before running the runner./<workerPath>/... (default /meframe-workers/...). If you do not pass workerPath, @meframe/server will start a temporary local server that serves @meframe/core/dist/workers and inject its base URL.Local end-to-end (writes packages/server/examples/local/out.mp4):
pnpm --filter @meframe/core build
pnpm --filter @meframe/adapter-medeo build
pnpm --filter @meframe/server build
MEFRAME_CHROME_PATH="/Applications/Google Chrome.app/Contents/MacOS/Google Chrome" \
MEFRAME_WORKER_PATH="https://medeo.app/fe-assets/meframe-workers-2" \
pnpm --filter @meframe/server dev
S3 example (reference; requires AWS creds + bucket CORS exposing ETag):
MEFRAME_CHROME_PATH="/Applications/Google Chrome.app/Contents/MacOS/Google Chrome" \
MEFRAME_WORKER_PATH="https://medeo.app/fe-assets/meframe-workers-2" \
MEFRAME_RUNNER_PAGE_URL="https://your-domain.example/meframe-runner.html" \
S3_BUCKET="your-bucket" \
MEDEO_PUBLIC_BASE_URL="https://cdn.example.com" \
node packages/server/examples/s3/export-to-s3.mjs
FAQs
Server-side exporter for @meframe/core (browser-driven, multipart upload via injected store)
The npm package @meframe/server receives a total of 108 weekly downloads. As such, @meframe/server popularity was classified as not popular.
We found that @meframe/server demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
An emerging npm supply chain attack that infects repos, steals CI secrets, and targets developer AI toolchains for further compromise.

Company News
Socket is proud to join the OpenJS Foundation as a Silver Member, deepening our commitment to the long-term health and security of the JavaScript ecosystem.

Security News
npm now links to Socket's security analysis on every package page. Here's what you'll find when you click through.