Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
amazon-asin-scraper
Advanced tools
IMPORTANT NOTE: This module is unmaintained and may not function due to recent changes made in amazon pages. Please consider other module. Also if you are looking for a scraper proxy to hide your IP while scraping consider SCRAPERAPI. It's FREE.
Making your amazon scraping job easier. This is going to be an alternative way to get the data you need that are not available on aws product and mws search api.
npm install amazon-asin-scraper
const asinScraper = require('amazon-asin-scraper');
// using callback
let options = {
asin : someAsinHere,
proxy : '', //optional
userAgent : '' //optional
};
asinScraper(options, (result)=>{
// result below
// {
// asin :
// sellerList : [
// {
// productTitle :
// customerReview :
// sellerName :
// sellerRating :
// fulfulledBy :
// primeBadge :
// offerPrice :
// shipping :
// merchantID :
// offerListingId :
// },
// {},
// {}
// ]
// }
});
For documentation and examples check out https://not-yet.com
FAQs
Amazon Scraper by ASIN ID
The npm package amazon-asin-scraper receives a total of 10 weekly downloads. As such, amazon-asin-scraper popularity was classified as not popular.
We found that amazon-asin-scraper demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.