
Research
5 Malicious Chrome Extensions Enable Session Hijacking in Enterprise HR and ERP Systems
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.
Lightweight pipe-based IPC for Bare.
npm i bare-ipc
IPCconst [portA, portB] = IPC.open(opts)Returns a pair of IPCPorts for use constructing the IPC duplex stream based on
bare-pipe.
const ipc = new IPC(port)Returns a duplex stream using the provided port. See streamx's Duplex for Duplex API.
ipc.ref()Increase the reference count for the IPC to keep the event loop alive.
A common pattern is to ipc.ref() on Bare.on('resume') and ipc.unref() on
suspend like so:
Bare.on('suspend', () => ipc.unref()).on('resume', () => ipc.ref())
ipc.unref()Decrease the reference count for the IPC to allow the event loop to exit.
See ipc.ref() for common pattern to keep the event loop alive.
IPCPortconst port = new IPCPort(incoming, outgoing)The arguments are:
incoming is the read file handleoutgoing is the write file handleport.connect()Returns an IPC connected to the port.
port.detachedA boolean for whether the port is detached.
Apache-2.0
FAQs
Lightweight pipe-based IPC for Bare
We found that bare-ipc demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.

Research
Node.js patched a crash bug where AsyncLocalStorage could cause stack overflows to bypass error handlers and terminate production servers.

Research
/Security News
A malicious Chrome extension steals newly created MEXC API keys, exfiltrates them to Telegram, and enables full account takeover with trading and withdrawal rights.