
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
@trigo/atrix-acl
Advanced tools
Atrix plugin providing Access Control Lists to requests to specific routes.
Sample Configuration:
acl: {
aclDefinition: path.join(__dirname, './acls'),
allowInject: true,
tokenResourceAccessRoleKey: 'pathfinder-app',
endpoints: [
'^(?!(/alive|/reset))',
],
}
Example:
{ role: 'admin', path: '/*a', method: '*' }
Allow user with role admin to access all paths with all methods
{ role: 'editor1', path: '/pets/:petId', method: 'put' }
Allow user with role editor1 access to path /pets/:petId with PUT method
{ userId: '242', path: '/pets/123', method: 'get' }
Allow user with userId 242 access to specific resource path /pets/123 with GET method
{ userId: '242', transition: 'cancel:speaker', method: '*' }
Allow user with userId 242 to perform transition 'cancel:speaker'
{ userId: '242', transition: 'cancel:(*_)', method: '*' }
Allow user with userId 242 to perform any transition starting with 'cancel:'
The AtrixACL uses route-parser npm package, to test incoming paths against the defined routes (similar to Hapi route definition).
The user role is extracted from the JWToken via the authorization header. The AtrixACL plugin assumes the following format of a token:
credentials: {
preferred_username: "john.doe",
email: "john.doe@test.com",
name: "John Doe",
resource_access: {
voegb: { roles: ['admin'] },
ak: { roles: ['admin'] },
'pathfinder-app': { roles: ['super-admin'] },
}
}
Given a configuration with the tokenResourceAccessRoleKey set to pathfinder-app, the AtrixACL uses this value as the default-role for the user (in the example above: 'super-admin')
If a x-pathfinder-tenant-ids header field is present, all the corresponding (tenant-specific) roles are extracted from the token and also tested agains the ACLs.
The AtrixACL plugin hooks into two handlers of the hapi request-lifecycle:
The plugins checks if the current user/role has access to the requested route. If not, it returns status-code 401. The options allowInject and endpoints are taken into consideration.
The plugins checks if a _links object is present in the response (or, if response-body is an array, in every item of the array) and manipulates the response-body. If present, every link/href in the hatr-links object is tested agains the ACLs and set to false, if the user/role has no access to a specific action/transition.
FAQs
ACL for atrix http endpoints
The npm package @trigo/atrix-acl receives a total of 0 weekly downloads. As such, @trigo/atrix-acl popularity was classified as not popular.
We found that @trigo/atrix-acl demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.