
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
aes-blowfish-nodejs
Advanced tools
Encrypting data in JavaScript
npm i aes-blowfish-nodejs
let AESblowFish = require('aes-blowfish-nodejs');
# Encryption
let cipherText = AESblowFish.encrypt(payload,"CryptoJS-AES-Key","BlowFish-Key");
# Decryption
let decryptedData = AESblowFish.decrypt(cipherText,"CryptoJS-AES-Key","BlowFish-Key");
There are Two keys that are to be kept very secretive.
Crypto-JS AES KEY : The key can be a string of your choice, like some sort of a secret phrase.
BlowFish KEY : This key should have a length of 32-bits to 448 bits, and it can contain phrase of your choice but in HEXA-DECIMAL.
Encryption Input : JSON Object or a string that you need to encrypt.
Decryption Input : CipherText that needs to be decrypted.
Invalid key For BlowFish Encryption
This error occurs when you have not followed instructions for the key assignment in BlowFish Key.
v1.2.1
-Removed debug output
v1.2.0
-Cyrpto encryption and decryption added
v1.0.2
-Updated ReadMe
for more information on BlowFish : https://www.geeksforgeeks.org/blowfish-algorithm-with-examples/
for more information on Crypto-JS : https://www.npmjs.com/package/crypto-js
for any queries drop a mail at krnak526@gmail.com
© Kiran A K
FAQs
Encrypting data in JavaScript
We found that aes-blowfish-nodejs demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.