
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
@openzeppelin/contracts-ui-builder-adapter-stellar
Advanced tools
@openzeppelin/contracts-ui-builder-adapter-stellar
)This package provides the ContractAdapter
implementation for the Stellar network for the Contracts UI Builder.
Note: While the basic structure is in place, including network configuration definitions, the core adapter logic for Stellar-specific operations is currently a placeholder and will be implemented in future development phases.
It is intended to be responsible for:
ContractAdapter
interface from @openzeppelin/contracts-ui-builder-types
.StellarNetworkConfig
objects. These are located in src/networks/
and include details like Horizon URLs, network passphrases, and explorer URLs.StellarNetworkConfig
.Once fully implemented, the StellarAdapter
class will be instantiated with a specific StellarNetworkConfig
object:
// Example: import { stellarPubnet } from '@openzeppelin/contracts-ui-builder-adapter-stellar';
import { StellarAdapter } from '@openzeppelin/contracts-ui-builder-adapter-stellar';
import { StellarNetworkConfig } from '@openzeppelin/contracts-ui-builder-types';
// For type access if needed
// Placeholder: Actual network config objects would be imported from './networks'
const placeholderNetworkConfig: StellarNetworkConfig = {
id: 'stellar-testnet',
name: 'Stellar Testnet',
ecosystem: 'stellar',
network: 'stellar',
type: 'testnet',
isTestnet: true,
horizonUrl: 'https://horizon-testnet.stellar.org',
networkPassphrase: 'Test SDF Network ; September 2015',
explorerUrl: 'https://stellar.expert/explorer/testnet',
// ... any other StellarNetworkConfig fields
};
const stellarAdapter = new StellarAdapter(placeholderNetworkConfig);
// Use stellarAdapter for operations on the configured Stellar network
Network configurations for Stellar networks (e.g., stellarPubnet
, stellarTestnet
) are defined and exported from src/networks/index.ts
within this package. The full list is exported as stellarNetworks
.
adapter-stellar/
├── src/
│ ├── config/ # Adapter-specific configuration
│ ├── contract/ # Contract interaction utilities
│ ├── mapping/ # Type mapping utilities
│ ├── networks/ # Stellar network configurations
│ ├── operations/ # Stellar operations management
│ ├── transaction/ # Transaction execution system
│ ├── validation/ # Validation utilities
│ ├── wallet/ # Wallet integration (placeholder)
│ ├── adapter.ts # Main StellarAdapter class implementation
│ └── index.ts # Public package exports
├── package.json
├── tsconfig.json
├── tsup.config.ts
├── vitest.config.ts
└── README.md
This adapter follows the standard module structure outlined in the main project Adapter Architecture Guide, with the src/networks/
directory for managing its network configurations.
FAQs
Stellar Adapter for Contracts UI Builder
The npm package @openzeppelin/contracts-ui-builder-adapter-stellar receives a total of 249 weekly downloads. As such, @openzeppelin/contracts-ui-builder-adapter-stellar popularity was classified as not popular.
We found that @openzeppelin/contracts-ui-builder-adapter-stellar demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 9 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.