
Research
Two Malicious Rust Crates Impersonate Popular Logger to Steal Wallet Keys
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
@posthog/engage-so-plugin
Advanced tools
The Engage Posthog plugin processes and sends customer data and events identified and tracked through Posthog to Engage. You can then use the data for customer segmentation, targeted campaigns and automation.
The plugin only tracks your Custom and $identify events.
During installation, you will provide your Engage secret key and public key. These are available on the account settings page of your Engage dashboard (Settings -> Account -> API keys). This is used to send your Posthog events to Engage.
Once setup is complete, Posthog will start sending your events to Engage and they will be available on your Engage account.
Extra event properties and metadata are also processed and sent to Engage.
posthog.identify(
'[user unique id]', // distinct_id, required
{ userProperty: 'value1' }, // $set, optional
{ anotherUserProperty: 'value2' } // $set_once, optional
);
The example above using the Posthog JS SDK appends extra properties to the identify event. These extra properties will be sent as well to Engage.
FAQs
Engage + Posthog Integration
We found that @posthog/engage-so-plugin demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 8 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.