
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
Chat with GPT from the terminal, and let it execute shell scripts and perform tasks for you. What could go wrong?
The reason I'm publishing this is that it is extremely useful to me, so I decided to share. Tools like AutoGPT are too heavy and autonomous, and copying contents from ChatGPT web into the command line is cumbersome. ChatSH lets you use ChatGPT directly from the terminal and execute commands suggested by it, making it an extremely powerful productivity tool, even though it is just a thin wrapper around the GPT API.
npm
:npm install -g chatsh
~/.config/openai.token
:echo "YOUR_OPENAI_TOKEN" > ~/.config/openai.token
chatsh # using gpt-3.5-turbo
chatsh 4 # using gpt-4
v@v ~/vic/dev/kindex$ chatsh 4
Welcome to ChatSH. Model: gpt-4
$ list all files below this directory that include Nat on its name
# Find all files below the current directory that include "Nat" in their name
find . -type f -iname "*Nat*"
EXECUTE? [y/n]y
./Fin/to_nat.kind2
./Parser/alternative.kind2
./U60/to_nat.kind2
./Bits/to_nat.kind2
./U120/to_nat.kind2
I think this should be obvious but since I've published it - always read carefully before executing a command. There is a reason there is a confirmation message. GPT could output anything, including commands that do serious harm to your system by accident. You're responsible for checking your commands. You've been warned!
FAQs
Enhance the command line with OpenAI's GPT
The npm package chatsh receives a total of 1 weekly downloads. As such, chatsh popularity was classified as not popular.
We found that chatsh demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.