Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@seasketch/geoprocessing
Advanced tools
Here you will find a place to store source data and scripts to produce derived products that will be used in geoprocessing functions. The docker-compose.yml file contains two useful containers for working on data.
To use these containers, run the following in the command line from data/
docker-compose run --rm workspace
This will start the workspace container open a shell in that environment.
It will also start a PostgreSQL database container. You can access this database using the psql
command (no args) within the workspace, or from the host computer on port 54320 using the credentials found in data/docker-compose.yml
. A great workflow is to use the up-to-date psql client and ogr/gdal libraries in the workspace to import and run scripted data prep tasks while using QGIS on the host computer to visualize spatial data in postgres. Files in your project will be mirrored to the workspace.
Note that when running docker-compose as shown above, the workspace container state will be deleted once you log out of the shell, while the database will be saved in a persistant volume.
FAQs
Geoprocessing and reporting framework for SeaSketch 2.0
The npm package @seasketch/geoprocessing receives a total of 1,382 weekly downloads. As such, @seasketch/geoprocessing popularity was classified as popular.
We found that @seasketch/geoprocessing demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.