
Research
Two Malicious Rust Crates Impersonate Popular Logger to Steal Wallet Keys
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
@serverless/tencent-cam-role
Advanced tools
Easily provision Tencent CAM roles using Serverless Components.
$ npm install -g serverless
Just create a serverless.yml
file
$ touch serverless.yml
$ touch .env # your Tencent api keys
# .env
TENCENT_SECRET_ID=123
TENCENT_SECRET_KEY=123
# serverless.yml
myFunction1:
component: "./tencent-cam-role"
inputs:
service:
- scf.qcloud.com
- cos.qcloud.com
policy:
roleName: QCS_SCFExcuteRole
# description: test # Optional
# policyId: # PolicyId and policyName must exist at least one
# - 1
# - 2
policyName:
- QCloudResourceFullAccess
- QcloudAccessForCDNRole
$ serverless
DFOUNDERLIU-MB0:temp dfounderliu$ sls
myFunction1:
name: w9pe3ej-jzy0lsg
roleId: 4611686018427945536
service:
- scf.qcloud.com
- cos.qcloud.com
policy:
roleName: QCS_SCFExcuteRole
policyId:
- 1
- 2
- 16313162
policyName:
- AdministratorAccess
- QCloudResourceFullAccess
- QcloudAccessForCDNRole
8s › myFunction1 › done
DFOUNDERLIU-MB0:temp dfounderliu$ sls remove
2s › myFunction1 › done
Checkout the Serverless Components repo for more information.
FAQs
Tencent Cloud Serverless CAM Role
We found that @serverless/tencent-cam-role demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 6 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.