Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
The perfect middleware between your static file server and the browser. Minifies, compresses, and caches files served to the client. If it's JS or CSS, it also transpiles unsupported features of the target browser. You may also use this in your build process to create browser-specific builds. It's traceur and myth on steroids.
The goal of this project is to create a frontend flow where:
Combined with polyfills, you can use most of the latest features of browsers with relative ease.
There's no:
Features:
var Ecstacy = require('ecstacy')
There are two builders.
Ecstacy.js
Ecstacy.css
Both inherit from Ecstacy
, defined below.
Delete the entire cache folder.
All Ecstacy
constructors have the following API:
Create a new instance. Some options are:
name
- the name of the file, specifically for source mapscode
- source codemap
- the source map, if any"Builds" a version of the file according to agents
.
agents
is simply passed tp polyfills-db.
data
is an object with the following properties:
hash
- the build hashcode
- the filename for the codemap
- the filename for the mapGet the absolute filename of a file.
Read a file by its name.
Returns a Buffer
, so you need to .toString()
it yourself.
var ecstacy = Ecstacy.js({
code: 'var a = b;'
})
ecstacy.build(useragent).then(function (data) {
return ecstacy.read(data.code, 'utf8')
}).then(function (js) {
})
Create a read stream for a file and extension instead of buffering it. Useful when serving files to the client.
FAQs
transpile JS based on user agents
The npm package ecstacy receives a total of 1 weekly downloads. As such, ecstacy popularity was classified as not popular.
We found that ecstacy demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.