
Security News
/Research
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
@neurosity/notion
Advanced tools
The Neurosity software processes and manages the data produced by Neurosity headsets which measures, tracks and monitors EEG brainwaves.
This repository is where Neurosity develops the SDK. This source code is available to everyone under the standard MIT license and the documentation is can be found on docs.neurosity.co. Thank you for visiting this repository.
This README file is a hub to give you some information about the SDK. At a high-level we seek to use the SDK to provide the following solutions:
There are many ways you can participate in the project, for example:
If you are interested in fixing issues and contributing directly to the code base, please see the document How to Contribute, which covers the following:
This project has adopted a Code of Conduct. Contact opensource@neurosity.co with any additional questions or comments.
Copyright (c) Neurosity, Inc. All rights reserved.
Licensed under the MIT license.
FAQs
Neurosity SDK
The npm package @neurosity/notion receives a total of 217 weekly downloads. As such, @neurosity/notion popularity was classified as not popular.
We found that @neurosity/notion demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.