
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
@webtask/cron-auth-middleware
Advanced tools
The cron auth middleware provides a simple cron authentication mechanism so that the Webtask cron daemon is able to make authenticated requests but third parties cannot.
To use the cron auth middleware leverages the fact that the Webtask cron daemon will invoke cron webtasks with an Authentication
header having a bearer token corresponding to the underlying webtask token of that cron job.
Set the wt-node-dependencies
metadata property to the stringified JSON of an object having @webtask/middleware-compiler
and @webtask/cron-auth-middleware
properties whose values are the latest version of the @webtask/middleware-compiler module and this module, respectively.
{"@webtask/middleware-compiler":"1.1.0","@webtask/cron-auth-middleware":"1.1.0"}
Set the wt-compiler
metadata property on your webtask to @webtask/middleware-compiler
.
Set (or add to) the wt-middleware
metadata property of your webtask to contain a comma-separated list containing @webtask/cron-auth-middleware
.
Schedule the webtask to run periodically and note that requests lacking an appropriate Authorization
header will fail with a 401
response.
FAQs
Webtask middleware that implements cron authentication
The npm package @webtask/cron-auth-middleware receives a total of 1 weekly downloads. As such, @webtask/cron-auth-middleware popularity was classified as not popular.
We found that @webtask/cron-auth-middleware demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 8 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.