Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
binder-build-core
Advanced tools
Logic for converting a directory containing dependency files into a Binder-compatible Docker image
Core logic for converting a directory containing dependencies into a Binder-compatible Docker image
In Binder, the binder-build
module is
responsible for fetching repository contents and handing them off to binder-build-core
, which will
then use one of a set of supported configuration configuration files in the directory to construct a Docker image (an executable environment).
binder-build-core
will search for the following files, in descending order of priority (only one will be used during the build process):
Dockerfile
requirements.txt
environment.yml
The first one it finds will be passed into a dependency handler for conversion into Dockerfile commands. The list of available dependency handlers and configuration file types can be found in the dependencies directory
npm install binder-build-core
var Builder = require('binder-build-core')
var buildOpts = { imageName: 'test', logger: logger }
var builder = new Builder(buildOpts)
builder.build(dirName, function (err, imageSource) {
...
})
FAQs
Logic for converting a directory containing dependency files into a Binder-compatible Docker image
We found that binder-build-core demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.