Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
There are several md5 modules on npm, but none of them use the crypto
node module.
Researching the performance impact of one vs another is tedious, and I just wanted to
use the core one without having to duplicate code all the time so I just implemented
this function as a separate module.
npm install --save crypto-md5
Returns a base64 md5 hash of the buffer or string. Can return an hex digest.
data
: buffer or string to hashdigest
: optional digest type. Can be base64
(default) or hex
var md5 = require('md5');
md5('foobar');
// OFj2IjCsPJFfMAxmQxLGPw==
md5('foobar', 'hex');
// 3858f62230ac3c915f300c664312c63f
Please open issues for bugs and suggestions in github. Pull requests with tests are welcome.
Jerome Touffe-Blin, @jtblin, About me
crypto-md5 is copyright 2015 Jerome Touffe-Blin and contributors. It is licensed under the BSD license. See the include LICENSE file for details.
FAQs
Simply expose crypto md5 as a single function
The npm package crypto-md5 receives a total of 179,396 weekly downloads. As such, crypto-md5 popularity was classified as popular.
We found that crypto-md5 demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.