
Research
Two Malicious Rust Crates Impersonate Popular Logger to Steal Wallet Keys
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
cross-platform-node-guide
Advanced tools
How to write cross-platform Node.js code.
Why you should care: according to the 2018 Node.js user survey, 24% of Node.js developers use Windows locally and 41% use Mac. In production 85% use Linux and 1% use BSD.
For any question, don't hesitate to submit an issue on GitHub.
Everyone is welcome regardless of personal background. We enforce a Code of conduct in order to promote a positive and inclusive environment.
This project was made with โค๏ธ. The simplest way to give back is by starring and sharing it online.
If the documentation is unclear or has a typo, please click on the page's Edit
button (pencil icon) and suggest a correction.
If you would like to help us fix an error or add more information, please check our guidelines. Pull requests are welcome!
Thanks go to these wonderful people:
ehmicky ๐ป ๐จ ๐ค ๐ | thatalextaylor ๐ค ๐ | Ben Noordhuis ๐ค ๐ | Steve Lee ๐ค ๐ข | Michael J. Ryan ๐ค | Fabio Spampinato ๐ค | AyrA ๐ค |
Felix Becker ๐ ๐ค | Nicola Dal Maso ๐ค |
FAQs
๐ฎ How to write cross-platform Node.js code
We found that cross-platform-node-guide demonstrated a not healthy version release cadence and project activity because the last version was released a year ago.ย It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.