
Security News
/Research
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
adonis5-sentry
Advanced tools
Sentry, Sentry SDK for Node JS , AdonisJS, Sentry for Adonis
Sentry service provider for Adonis-5
npm i --save adonis5-sentry
Compile your code:
node ace serve --watch
Connect all dependences:
node ace invoke adonis5-sentry
config/sentry.ts
.After loading all providers Sentry service will be initialized. After this you can import Sentry service anywhere in your application in such way:
import Sentry from '@ioc:Adonis/Addons/Sentry'
import Sentry from '@ioc:Adonis/Addons/Sentry'
import Logger from '@ioc:Adonis/Core/Logger'
import HttpExceptionHandler from '@ioc:Adonis/Core/HttpExceptionHandler'
export default class ExceptionHandler extends HttpExceptionHandler {
constructor () {
super(Logger)
}
public async handle (error, ctx) {
Sentry.captureException(error)
return super.handle(error, ctx)
}
}
For additional details of Sentry API, please check the Sentry SDK documentation by this link Sentry docs
FAQs
Sentry provider for AdonisJS 5
The npm package adonis5-sentry receives a total of 1,209 weekly downloads. As such, adonis5-sentry popularity was classified as popular.
We found that adonis5-sentry demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.