
Security News
vlt Launches "reproduce": A New Tool Challenging the Limits of Package Provenance
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
@neon-exchange/nash-protocol-legacy
Advanced tools
Implementation of Nash cryptographic routines.
Make sure you have the following system commands available.
cmake make gcc gmp-devel openssl-devel clang npm
yarn install
yarn build
yarn test
The Nash Protocol contains functions necessary to create, setup, and authenticate into an account.
This step registers a new user with Nash's Central Accounts System.
hashPassword()
should be called to hash the password, and getHKDFKeysFromPassword()
should be called on the hashed password to get an authentication key and encryption key.This step creates blockchain wallets for a user.
getEntropy()
is called to generate a secret key.secretKeyToMnemonic()
is called on the secret key to provide a user's mnemonic. The user should persist this and never share this value.mnemonicToMasterSeed()
is called on the mnemonic to create the master seed, which is the seed value for BIP-44 HD wallet generation.generateWallet
is called using the master seed for all supported coin types.encryptSecretKey()
, which produces an encrypted secret key AEAD object. This is sent to Nash.getHKDFKeysFromPassword()
is used to get the authentication key and encryption key.initialize()
with the encrypted secret key AEAD object, encryption key, wallet metadata, and some Nash Matching Engine market and asset data to receive a config.Secret values are never sent to Nash. Values that are visible to Nash are. A combination of secret values and values accessible by Nash are needed for all sensitive operations. Both types of values are sensitive and should be carefully guarded.
We will NOT support the user supplying their own wallet keys. While users will control their own wallets, we will generate the wallets for them. This is partially because we want wallets to be deterministically derivable from the master seed.
FAQs
TypeScript implementation of Nash crypto routines
We found that @neon-exchange/nash-protocol-legacy demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 9 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
Research
Security News
Socket researchers uncovered a malicious PyPI package exploiting Deezer’s API to enable coordinated music piracy through API abuse and C2 server control.
Research
The Socket Research Team discovered a malicious npm package, '@ton-wallet/create', stealing cryptocurrency wallet keys from developers and users in the TON ecosystem.