Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
@vechain/connex-repl
Advanced tools
[![npm version](https://badge.fury.io/js/%40vechain%2Fconnex-repl.svg)](https://badge.fury.io/js/%40vechain%2Fconnex-repl)
Connex REPL the REPL style command-line playground to try out Connex interface.
It requires NodeJS version >= 10
$ npm i -g @vechain/connex-repl
Startup to connect with local thor node by default (http://localhost:8669/)
$ connex
or the remote one
$ connex http://remote-thor-node-api-base-url
Then you get a NodeJS REPL interface. e.g.
VeChain Connex Playground @ http://localhost:8669/
connex v1.3.1
Testnet(100%)>
Check VeChain status
Testnet(100%)> thor.status
Get newest block
Testnet(100%)> await thor.block().get()
Import private key
Testnet(100%)> wallet.import('<private key>')
This package is licensed under the GNU Lesser General Public License v3.0, also included in LICENSE file in the repository.
FAQs
[![npm version](https://badge.fury.io/js/%40vechain%2Fconnex-repl.svg)](https://badge.fury.io/js/%40vechain%2Fconnex-repl)
The npm package @vechain/connex-repl receives a total of 3 weekly downloads. As such, @vechain/connex-repl popularity was classified as not popular.
We found that @vechain/connex-repl demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.