
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
@pinax/chains
Advanced tools
Welcome to the Pinax Chains repository. This is the definitive source for the metadata of chains supported by Pinax products. Note that we maintain a separate, private list for internal operations.
To enhance accessibility, we offer the metadata as an npm package and provide a public API endpoint for fetching the data.
You can view details about the Chain Type and explore our list of supported, to-be-supported, or deprecated chains.
Note: Some chains may be listed without supported services or may have been deprecated. Always check the chain's metadata to confirm its current support status.
With the 2.0 release, we’ve made significant improvements to enhance developer and maintainer experience. Key updates include:
unreleased
and beta
servicesYou first need to install bun.
To install the package, run:
npm install @pinax/chains
Access the chains metadata via the public API endpoint:
curl https://pinax.network/api/chains
Please see How to use documentation for more information.
If you wish to contribute to the chain metadata, please open a pull request (PR) with your proposed changes. We will review and merge it if accurate. Be sure to consult the documentation before contributing.
FAQs
Single-source-of-truth for the metadata of chains supported by Pinax.
The npm package @pinax/chains receives a total of 36 weekly downloads. As such, @pinax/chains popularity was classified as not popular.
We found that @pinax/chains demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.