Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@pulumi/aiven
Advanced tools
The Aiven resource provider for Pulumi lets you manage Okta resources in your cloud programs. To use this package, please install the Pulumi CLI first.
This package is available in many languages in the standard packaging formats.
To use from JavaScript or TypeScript in Node.js, install using either npm
:
$ npm install @pulumi/aiven
or yarn
:
$ yarn add @pulumi/aiven
To use from Python, install using pip
:
$ pip install pulumi_aiven
To use from Go, use go get
to grab the latest version of the library
$ go get github.com/pulumi/pulumi-aiven/sdk/v2/go/...
To use from .NET, install using dotnet add package
:
$ dotnet add package Pulumi.Aiven
The following configuration points are available:
aiven:apiToken
- (Optional) This is the API token to interact with your Aiven account. May be set via the AIVEN_API_TOKEN
environment variable.For further information, please visit the Aiven provider docs or for detailed reference documentation, please visit the API docs.
FAQs
A Pulumi package for creating and managing Aiven cloud resources.
The npm package @pulumi/aiven receives a total of 7,138 weekly downloads. As such, @pulumi/aiven popularity was classified as popular.
We found that @pulumi/aiven demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.