
Research
/Security News
9 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads
Socket researchers discovered nine malicious NuGet packages that use time-delayed payloads to crash applications and corrupt industrial control systems.
@step-mobile/sdk
Advanced tools
This SDK contains code and logic for authenticating and communicating with the Step API.
This SDK contains code and logic for authenticating and communicating with the Step API.
yarn install
yarn validate
First, make sure you have the various services running locally, by following Server Readme - Running Services.
Then, you can run local integration tests with:
yarn test:local
yarn test:dev
You should always run generate command first to make sure the SDK is up to date with Swagger
yarn generate
Next, lint and build the source code by running the validate command, this updates the dist directory that will be published to npm:
yarn validate
To publish, simply run yarn publish.
If you do not have access, you can request access from martin@step.com
FAQs
This SDK contains code and logic for authenticating and communicating with the Step API.
We found that @step-mobile/sdk demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 11 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
/Security News
Socket researchers discovered nine malicious NuGet packages that use time-delayed payloads to crash applications and corrupt industrial control systems.

Security News
Socket CTO Ahmad Nassri discusses why supply chain attacks now target developer machines and what AI means for the future of enterprise security.

Security News
Learn the essential steps every developer should take to stay secure on npm and reduce exposure to supply chain attacks.