Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@oracle/oraclejet-audit
Advanced tools
Oracle JET audits run against the application files of your JET project and perform a static analysis of the source code from an Oracle JET perspective. Audit messages result from an invocation of the Oracle JET Audit Framework (JAF) command-line utility and are governed by rules that are specific to a JET release version. As such, you can update the framework installation for a new Oracle JET release or configure the Oracle JAF audit for a previous release.
With Oracle JAF installed, audits that you perform against your Oracle JET application run in a Command-Line Interface, similar to the Oracle JET CLI. The installation of JAF provides a lint-style command-line utility named "ojaf" that audits JET application files (currently HTML, JS, CSS, and JSON) by applying rules that perform a static analysis from an Oracle JET perspective. The audit messages returned by invocation of the "ojaf" utility result from a rule set that is specific to the Oracle JET release version of the application. As new versions of Oracle JET are released, Oracle JAF and the applicable rules may be updated. For this reason, you will want to update JAF regularly.
Please see the JET Audit Framework for details.
For web app development, install this module as follows:
npm install -g @oracle/oraclejet-audit
FAQs
JET AUDIT FRAMEWORK
The npm package @oracle/oraclejet-audit receives a total of 227 weekly downloads. As such, @oracle/oraclejet-audit popularity was classified as not popular.
We found that @oracle/oraclejet-audit demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.