
Research
TeamPCP Compromises Telnyx Python SDK to Deliver Credential-Stealing Malware
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.
@vltpkg/cache-unzip
Advanced tools
This is a script that can be run as a detached background process to un-gzip any cached response bodies in the vlt cache.
Whenever you get a cache entry with a gzipped body, tell this module about it.
import { register } from '@vltpkg/cache-unzip'
import { Cache } from '@vltpkg/cache'
const cache = new Cache({ path: cachePath })
// later...
const response = get_response_cache_entry_somehow()
cache.set(myKey, response.encode())
// unzip it after this process is done
if (response.isGzip) {
register(cachePath, myKey)
}
On process exit, these registered keys will be passed as arguments to
a detached deref'ed vlt-cache-unzip process. So, the main program
exits normally, but the worker ignores the SIGHUP and keeps going
until it's done. The next time that cache entry is read, it won't have
to be unzipped.
Because it's faster to not have to decompress the same content more times than necessary.
FAQs
Daemon that manages the @vltpkg/cache disk store
We found that @vltpkg/cache-unzip demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 6 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.

Security News
TeamPCP is partnering with ransomware group Vect to turn open source supply chain attacks on tools like Trivy and LiteLLM into large-scale ransomware operations.

Security News
/Research
Widespread GitHub phishing campaign uses fake Visual Studio Code security alerts in Discussions to trick developers into visiting malicious website.