
Security News
Axios Maintainer Confirms Social Engineering Attack Behind npm Compromise
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.
@regulaforensics/document-reader
Advanced tools
This is an npm module for Regula Document Reader SDK. It allows you to read various kinds of identification documents using your phone's camera.
Document Reader allows you to read various kinds of identification documents, passports, driving licenses, ID cards, etc. All processing is performed completely offline on your device. This plugin makes possible to use it with react-native, cordova and capacitor applications.
In the examples folder you can find 3 demo applications:
Each demo app has its own readme file with instructions on building and installation.
If you have any technical questions, feel free to contact us or create issues here.
FAQs
This is an npm module for Regula Document Reader SDK. It allows you to read various kinds of identification documents using your phone's camera.
The npm package @regulaforensics/document-reader receives a total of 1,881 weekly downloads. As such, @regulaforensics/document-reader popularity was classified as popular.
We found that @regulaforensics/document-reader demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.