
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
behind-bars
Advanced tools
Abort if the process isn't sandboxed as intended and can access sensitive files
Does it bug you to think that maybe a dependency of a dependency that your script uses, could become malicious and look through your files then phone home anything it wants, as recently seen with crypto wallets in the event-stream attack, or sensitive Linux files? Open source supply chain attacks have been on the rise.
The solution is to run your scripts in a sandboxed environment such as firejail, bubblewrap, or a VM (Docker is a containerization solution, not aimed at security). This module lets you make sure that the sandbox is working as intended. Note that the module doesn't provide sandboxing capabilities itself; use a dedicated tool for that, such as the ones mentioned earlier.
Simply add import 'behind-bars';
as the first line of your script, and rest assured the script will exit immediately if it can access sensitive files or directories (browser profiles, cryptocurrency wallets, ~/*_history
etc.) on Linux/MacOS systems. (PRs welcome for Windows paths)
You can optionally ensure there's no network access either, or specify custom files/directories to check against, by creating a configuration file behind-bars.json
with the following syntax:
{
"paths": ["~/.conf*"],
"pathsExtra": ["~/.ssh"],
"urls": ["https://google.com"]
}
paths
- exit if any of these paths can be read; overrides the default pathspathsExtra
- check these paths aren't readable in addition to the default onesurls
- exit if any of these URLs is accessiblepaths
or pathsExtra
.paths*
arrays support standard globbing and ~
.ensureNoAccess()
, but it's necessary because it's impossible to pass options via ES6 imports, and import
statements are hoisted at the top of the script. This means that calling that method would happen after your script had already imported other packages, which could include a malicious dependency that would get a chance to exfiltrate data before ensureNoAccess()
runs.npm i behind-bars
import 'behind-bars';
.mjs
files: import 'behind-bars/index.mjs';
require('behind-bars/index.js')
;This is a hybrid npm package (created using variation 2.4.1 described on that page), with conditional exports that enable named imports even from TypeScript code generating ES Modules, which would otherwise only support default (not named) imports from the CommonJS target of this package (TypeScript doesn't support .mjs input files).
// 'behind-bars' must be the first import
import 'behind-bars';
// ... your code here
// ... imported packages don't have access to sandboxed files
paths
and pathsExtra
in the configuration fileMIT
FAQs
Abort if the process isn't sandboxed as intended and can access sensitive files
The npm package behind-bars receives a total of 3 weekly downloads. As such, behind-bars popularity was classified as not popular.
We found that behind-bars demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.