
Research
/Security News
Weaponizing Discord for Command and Control Across npm, PyPI, and RubyGems.org
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
@withgraphite/gti-server
Advanced tools
This is the server-side code for gti
.
This code is based on the MIT-licensed code isl
published by Meta as part of the sapling
project. The original license can be found in licenses/isl.txt
. It was hard-forked from https://github.com/facebook/sapling
on sha 708cbba23299934cb0db01fc3112c8a991feaa40
, with selected changes pulled in until sha 89fb18345eb629d11cfe9325ee7708a4b15b6f0f
and later f7e8639689026587d4ca0ef6939ccbca22d676f8
.
That code can be found here: https://github.com/facebook/sapling/tree/708cbba23299934cb0db01fc3112c8a991feaa40/addons/isl-server
This derivative work is still governed by the license in the root of this repository.
FAQs
deprecated
The npm package @withgraphite/gti-server receives a total of 49 weekly downloads. As such, @withgraphite/gti-server popularity was classified as not popular.
We found that @withgraphite/gti-server demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 10 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
Security News
Socket now integrates with Bun 1.3’s Security Scanner API to block risky packages at install time and enforce your organization’s policies in local dev and CI.
Research
The Socket Threat Research Team is tracking weekly intrusions into the npm registry that follow a repeatable adversarial playbook used by North Korean state-sponsored actors.