Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
dynamodb-admin
Advanced tools
GUI for DynamoDB Local, dynalite, localstack etc.
npm install -g dynamodb-admin
dynamodb-admin --dynamo-endpoint=http://localhost:8000
Options:
--open
/ -o
- opens server URL in a default browser on start--port PORT
/ -p PORT
- Port to run on (default: 8001)--host HOST
/ -h HOST
- Host to run on (default: localhost)--dynamo-endpoint
- DynamoDB endpoint to connect to (default: http://localhost:8000).--skip-default-credentials
- Skip setting default credentials and region. By default the accessKeyId/secretAccessKey are set to "key" and "secret" and the region is set to "us-east-1". If you specify this argument then you need to ensure that credentials are provided some other way. See https://docs.aws.amazon.com/sdk-for-javascript/v3/developer-guide/setting-credentials-node.html for more details on how default credentials provider works.Environment variables HOST
, PORT
and DYNAMO_ENDPOINT
can also be used to set the respective options.
If you use a local dynamodb that cares about credentials, you can configure them by using the following environment variables AWS_REGION
AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
or specify the --skip-default-credentials
argument and rely on the default AWS SDK credentials resolving behavior.
For example with the amazon/dynamodb-local
docker image you can launch dynamodb-admin
with:
AWS_REGION=eu-west-1 AWS_ACCESS_KEY_ID=local AWS_SECRET_ACCESS_KEY=local dynamodb-admin
If you are accessing your database from another piece of software, the AWS_ACCESS_KEY_ID
used by that application must match the AWS_ACCESS_KEY_ID
you used with dynamodb-admin
if you want both to see the same data.
By default dynamodb-admin
sets a default key/secret to values "key" and "secret" and the region to "us-east-1".
This requires AWS SDK v3. If you depend on AWS SDK v2 then you need to use dynamodb-admin v4.
import { DynamoDBClient } from '@aws-sdk/client-dynamodb';
import { createServer } from 'dynamodb-admin';
const dynamoDbClient = new DynamoDBClient();
const app = createServer({ dynamoDbClient });
const host = 'localhost';
const port = 8001;
const server = app.listen(port, host);
server.on('listening', () => {
const address = server.address();
console.log(` listening on http://${address.address}:${address.port}`);
});
Run npm run build
and then DYNAMO_ENDPOINT=http://localhost:8000 npm run start
to start dynamodb-admin.
You can set up a build watcher in a separate terminal using npm run build:watch
which will re-compile the code on change and cause the dynamodb-admin instance to restart.
FAQs
GUI for DynamoDB. Useful for local development.
The npm package dynamodb-admin receives a total of 20,670 weekly downloads. As such, dynamodb-admin popularity was classified as popular.
We found that dynamodb-admin demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.