Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
EJSON - Extended and Extensible JSON library from Meteor made compatible for Nodejs and Browserif
ejson
is an extension of JSON to support more types. It supports all JSON-safe
types as well as
Uinit8Array
The ejson
module is port of Meteor's EJSON parser which has been made
compatible for Node.js and browsers. This way, other
real-time libraries can also make use of
these extensions.
The module is released through npm:
npm install --save ejson
The API is exactly the same as the API that Meteor provides as it uses exactly the same code. The most important API's are:
EJSON.clone
EJSON.parse
EJSON.stringify
And some utility methods:
EJSON.toJSONValue
EJSON.fromJSONValue
EJSON.isBinary
EJSON.newBinary
EJSON.equals
See the meteor EJSON documentation for more detailed information.
This module is licensed under MIT. Same as Meteor.js is.
FAQs
EJSON - Extended and Extensible JSON library from Meteor made compatible for Nodejs and Browserify
We found that ejson demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.