
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
appium-interceptor
Advanced tools
This is an Appium plugin designed to intercept API response and mocking easy. This plugin uses mitmproxy
Install the plugin using Appium's plugin CLI, either as a named plugin or via NPM:
appium plugin install --source=npm appium-interceptor
The plugin will not be active unless turned on when invoking the Appium server:
appium server -ka 800 --use-plugins=appium-interceptor -pa /wd/hub
For every appium session, interceptor plugin will start a proxy server and updates the device proxy settings to pass all network traffic to proxy server. Mocking is disabled by default and can be enabled from the test by passing appium:intercept : true
in the desired capability while creating a new appium session.
Please refer to the commands sections for detailed usage.
💚 Android
Mocking support
Refer Examples here
In certain instances where the session terminates abruptly, the device proxy state may persist without being cleared, leading to a non-functional network connection. To rectify this issue and reset the device proxy state, execute the following adb command.
adb shell settings put global http_proxy :0
npm install
npm run build
A special thanks to creators and maintainers of node-http-mitm-proxy. Their efforts have laid the foundation for the capabilities embedded in this plugin.
FAQs
Appium 2.0 plugin to mock api calls for android apps
The npm package appium-interceptor receives a total of 7 weekly downloads. As such, appium-interceptor popularity was classified as not popular.
We found that appium-interceptor demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.