
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
A Bolt Cypher Shell example built with oclif the "open source cli framework" from SalesForce/Heroku.
-a bolt-address
, .e.g -a bolt://localhost:7687
-u username
, e.g. -u neo4j
-p password
, e.g. -p "xJMa2iacc}HGqsbjpuTaXpwF"
-t
table modeJust pass your Cypher query in double quotes, you can use single quotes within the query.
boltsh -p "xJMa2iacc}HGqsbjpuTaXpwF" -t "MATCH (n:Person)-->(m:Movie) RETURN n.name as person, n.born, collect(m.title) as movies LIMIT 10"
.-------------------------------------------------------------------------------------.
| n.name | n.born | movies |
|--------------------|--------|-------------------------------------------------------|
| Diane Keaton | 1946 | Something's Gotta Give |
| Christina Ricci | 1980 | Speed Racer |
| Robert Zemeckis | 1951 | Cast Away,The Polar Express |
| Renee Zellweger | 1969 | Jerry Maguire |
| Brooke Langton | 1970 | The Replacements |
| Kiefer Sutherland | 1966 | A Few Good Men,Stand By Me |
| Greg Kinnear | 1963 | As Good as It Gets,You've Got Mail |
| Ed Harris | 1950 | Apollo 13 |
| Bruno Kirby | 1949 | When Harry Met Sally |
| Laurence Fishburne | 1961 | The Matrix,The Matrix Reloaded,The Matrix Revolutions |
'-------------------------------------------------------------------------------------'
Returned 10 row(s) in 16 ms.
FAQs
Bolt Cypher Shell
The npm package boltsh receives a total of 0 weekly downloads. As such, boltsh popularity was classified as not popular.
We found that boltsh demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.