Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
bastion-siege-logic
Advanced tools
[![NPM Version](https://img.shields.io/npm/v/bastion-siege-logic.svg)](https://www.npmjs.com/package/bastion-siege-logic) [![node](https://img.shields.io/node/v/bastion-siege-logic.svg)](https://www.npmjs.com/package/bastion-siege-logic) [![Build Status](
This project contains what I reverse engineered about the logic of BastionSiege, a Telegram Game made by @DorianPeregrim.
I like the game and like the challenge of reverse engineering it for fun and improving my programming skills.
This library can be used for assisting purposes like @BastionSiegeAssistBot (EdJoPaTo/BastionSiegeAssistBot) but is not intended for game automation or other means of cheating within the game. Please respect the fun of others and Dorians work creating the game.
The TypeScript types and method names should help you enough :)
MIT © EdJoPaTo
FAQs
[![NPM Version](https://img.shields.io/npm/v/bastion-siege-logic.svg)](https://www.npmjs.com/package/bastion-siege-logic) [![node](https://img.shields.io/node/v/bastion-siege-logic.svg)](https://www.npmjs.com/package/bastion-siege-logic) [![Build Status](
The npm package bastion-siege-logic receives a total of 8 weekly downloads. As such, bastion-siege-logic popularity was classified as not popular.
We found that bastion-siege-logic demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.