
Research
5 Malicious Chrome Extensions Enable Session Hijacking in Enterprise HR and ERP Systems
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.
Multi-format schema-based serializer, deserializer and validator. Charged URI syntax. URI Charge Notation
ChURI is a polyglot serializer, deserializer and validator supporting various data formats.
The data processing is based on data schemas. Schemas are written in TypeScript. ChURI compiles such schemas into efficient code implementing serializers, deserializers, and validators for the data conforming to those schemas.
The main data format supported is URI Charge Notation, which is used to encode data included into URI. Such URI is called Charged URI, or ChURI.
Other data formats supported out of the box:
application/x-www-form-urlencoded (URI query parameters)Some formats support insets containing data in another formats. For example, the application/x-www-form-urlencoded
format allows query parameter values to be encoded as URL-encoded ones, as plain text, or as URI Charge. The choice
is made by data schema.
Charged URI (ChURI) may include arbitrary structured data. The data is encoded with URI Charge Notation.
It is like JSON for GET requests, but may include even more:
https://example.com/!v(3)api/user;id=0n302875106592253/article;slug=hello-world/comments?date=since(!date'1970-01-01)till(!now)&range=from(10)to(20)
This package provides:
application/x-www-form-urlencoded format support.FAQs
Multi-format schema-based serializer, deserializer and validator. Charged URI syntax. URI Charge Notation
We found that churi demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.

Research
Node.js patched a crash bug where AsyncLocalStorage could cause stack overflows to bypass error handlers and terminate production servers.

Research
/Security News
A malicious Chrome extension steals newly created MEXC API keys, exfiltrates them to Telegram, and enables full account takeover with trading and withdrawal rights.