
Research
Two Malicious Rust Crates Impersonate Popular Logger to Steal Wallet Keys
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
@transcend-io/cli2
Advanced tools
CLI arguments that accept lists can be specified either as a delimited string or as the same argument passed multiple times. For example, the following help text shows that the --origins
argument accepts a list of origins. It can be specified as a comma-separated string:
FLAGS
[--origins]... The request origins to approve [separator = ,]
The following commands are thus equivalent:
npx @transcend-io/cli2 request approve --origins "US,EU"
npx @transcend-io/cli2 request approve --origins US --origins EU
The only exception is for arguments that have a default list value. In this case, there will be no [separator = ,]
specification in the argument's help text.
Checkout the repo, and install:
pnpm install
In a separate terminal, build the CLI and watch for changes:
pnpm build:watch
To call the CLI while developing, you can use the following command:
pnpm start --help
This is equivalent to calling the CLI entrypoint:
npx @transcend-io/cli2 --help
FAQs
A command line interface for programmatic operations across Transcend.
We found that @transcend-io/cli2 demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 6 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.