
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
discord-webhook-manager
Advanced tools
A Discord Webhook Manager for Node.JS - Easily customisable webhook settings with webhook rate limits
A lightweight Discord Webhook Manager for Node.JS - Easily customisable webhook settings with webhook rate limits and let the manager send the webhooks for you!
Node 8+ is required for the webhook manager to work. Previous versions of Node.JS may work, however they will not be supported. To install, run this in your project folder:
npm i discord-webhook-manager
yarn add discord-webhook-manager
bower install discord-webhook-manager
const WebhookManager = require('discord-webhook-manager');
const webhook1 = new WebhookManager(webhookID, webhookToken[, format[, interval[, joinInputLengths]]]);
webhook1.addToQueue('Message goes here')
webhookID
: string - Webhook ID
webhookToken
: string - Webhook Token
format
: object (optional) - The way the webhook should be sent, this should be in the Discord webhook format. Use 'text'
as a placeholder for adding messages to the queue. Default:
{
content: 'text'
}
interval
: number (optional) - Interval at which webhooks should be sent at in milliseconds, e.g. 5000
would be 5 seconds. Default: 2000
joinInputLengths
: number (optional) - Maximum character count of joined messages (especially useful for logs). If you don't want them joined, leave at 0
. Default: 0
webhook1.url
: string - URL of selected Webhook
webhook1.format
: object - Format of webhook message as set in format
parameter
webhook1.interval
: number - Interval at which webhooks are sent in milliseconds
webhook1.joinInputLengths
: number - Maximum length of joined messages, or no joined messages if 0
webhook1.queue
: string[] - Array of messages in the queue
webhook1.rateLimiter
: Date[] - Array of ISO8601 timestamps of sent webhooks, used for rate limiting webhook requests
webhook1.enabled
: boolean - Whether the webhook is running or not
webhook1.addToQueue('Message here')
: string[] - Adds a message to the queue. Returns the queue
webhook1.emptyQueue()
: string[] - Removes everything in the queue. Returns the empty queue
webhook1.resetRateLimit()
: Date[] - Resets the rate limit. Returns the empty rate limit
webhook1.updateWebhook('649305310778884106', 'TYCRyGQbze-UTFzlUgOmP6FgQK_0LnL5axCku06fTDr-CyI1VytbcDRveDl0frbA_PiM0')
: string - Updates the webhook URL. Returns the new Webhook URL (don't try using this, it doesn't exist)
webhook1.pauseWebhookSending()
: boolean - Pause webhook sending. Returns the enabled status
webhook1.startWebhookSending()
: boolean - Start/resume webhook sending. Returns the enabled status
webhook1.stopWebhookSending()
: boolean - End webhook sending and clear the queue. Returns the enabled status
Emits when an error occurs with the webhook sending
webhook1.on('error', (errorMessage: string, error: Error) => {
console.error(error)
console.error(errorMessage)
// Do something to resolve the error
});
FAQs
A Discord Webhook Manager for Node.JS - Easily customisable webhook settings with webhook rate limits
We found that discord-webhook-manager demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.