
Research
Node.js Fixes AsyncLocalStorage Crash Bug That Could Take Down Production Servers
Node.js patched a crash bug where AsyncLocalStorage could cause stack overflows to bypass error handlers and terminate production servers.
@smithy/hash-node
Advanced tools
[](https://www.npmjs.com/package/@smithy/hash-node) [](https://www.npmjs.com/package/@smithy/hash-node)
The 'crypto' module is a built-in Node.js module that provides cryptographic functionalities, including hashing. It supports various algorithms like SHA-256, MD5, and more. Compared to @smithy/hash-node, 'crypto' is more versatile and widely used but may not be as specialized for SDK development.
The 'hash.js' package is a JavaScript library that provides hash functions for various algorithms like SHA-256, SHA-512, and more. It is similar to @smithy/hash-node in terms of functionality but is more focused on providing a wide range of hash algorithms.
The 'bcrypt' package is used for hashing passwords and is known for its security features. While it provides hashing functionalities, it is more specialized for password hashing and security, unlike @smithy/hash-node, which is more general-purpose.
FAQs
[](https://www.npmjs.com/package/@smithy/hash-node) [](https://www.npmjs.com/package/@smithy/hash-node)
The npm package @smithy/hash-node receives a total of 25,668,268 weekly downloads. As such, @smithy/hash-node popularity was classified as popular.
We found that @smithy/hash-node demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Node.js patched a crash bug where AsyncLocalStorage could cause stack overflows to bypass error handlers and terminate production servers.

Research
/Security News
A malicious Chrome extension steals newly created MEXC API keys, exfiltrates them to Telegram, and enables full account takeover with trading and withdrawal rights.

Security News
CVE disclosures hit a record 48,185 in 2025, driven largely by vulnerabilities in third-party WordPress plugins.