
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
@naverpay/device-info
Advanced tools
A library for converting device IDs to user-friendly model names
npm install @naverpay/device-info
# or
yarn add @naverpay/device-info
# or
pnpm add @naverpay/device-info
import { ios, aos } from "@naverpay/device-info";
console.log(ios["iPhone15,4"]); // 'iPhone 15'
console.log(aos["SM-S901B"]); // 'Galaxy S22'
iosObject containing iOS device identifier to model name mappings.
Record<string, string>iPhone14,2 → iPhone 13 ProaosObject containing Android device model to marketing name mappings.
Record<string, string>SM-G991B → Galaxy S21 5Gimport { ios, aos } from "@naverpay/device-info";
// iOS
const iosModel = ios["iPhone14,2"] || "Unknown iPhone";
// Android
const androidModel = aos["SM-G991B"] || "Unknown Android";
function getDeviceName(deviceId, platform) {
if (platform === "ios") {
return ios[deviceId] || `Unknown iOS (${deviceId})`;
} else if (platform === "android") {
return aos[deviceId] || `Unknown Android (${deviceId})`;
}
return "Unknown Device";
}
Q: How often is the data updated?
A: Device data is updated weekly (every Monday) from official sources.
Q: What if a device ID is not found?
A: The library returns undefined. Always provide a fallback value.
Q: Where does the data come from?
A:
MIT
FAQs
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.