Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
This project allows you to upload coverage reports for both branches and pull requests, and will, if it has stored the coverage for the target branch, add a comment on bitbucket to the pullrequest, detailing the changes in coverage caused by this pull request.
Pick a folder and install the server:
npm install covwatcher
Next you have to provide a number of variables, either via setting environment variables (recommended) or by editing ./dist/config.js
.
COVWATCHER_PORT=8080 // port to be used by the server
COVWATCHER_ADDRESS=your.Server.com // address the server should use
COVWATCHER_APPROOT=/your/folder/ // full path to app root
COVWATCHER_STORAGE=/your/storage/folder/ // where to store all uploaded repositories
COVWATCHER_BITBUCKET=https://your.bitbucket.server:port/ // full url of your bitbucket server
COVWATCHER_BITBUCKET_KEY=SomeBitbucketAccessKey // the access key to be used when posting the comments
Finally setup the covwatcher-client both for your branches and pullrequest in Jenkins (or whatever pipeline you use).
Tested with NodeJs v10
FAQs
A server to diff clover coverage xmls and post results to bitbucket
The npm package covwatcher receives a total of 0 weekly downloads. As such, covwatcher popularity was classified as not popular.
We found that covwatcher demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.