
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
Password based en-/decryption of arbitrary data with and for node.js.
encrypt, decrypt and keystore command line utilitiesThe API is quite simple:
var endecrypt = require("endecrypt");
Encrypts the specified buffer with the given passphrase and returns the encrypted binary data.
Decrypts the specified buffer with the given passphrase and returns the decrypted binary data.
Encrypts the specified JSON data with the given passphrase and returns the encrypted store data.
Decrypts the specified store data with the given passphrase and returns the decrypted JSON data.
Creates a ready-to-pipe encrypting (transforming) stream.
Creates a ready-to-pipe decrypting (transforming) stream.
Pretty much the same as available through the API, but with the exception that the application will ask for the passphrase if it is not specified as an argument. The number of PBKDF2 rounds defaults to 100000.
encrypt <infile> [-r=ROUNDS] [-p=PASSPHRASE] [> <outfile>]decrypt <infile> [-r=ROUNDS] [-p=PASSPHRASE] [> <outfile>]keystore list|add|get|del ... Run keystore for the detailsendecrypt provides the tools to en-/decrypt arbitrary JSON data including binary buffers and utilizes the PSON data format internally for the purpose of converting JSON data to its binary representation prior to encryption and vice-versa. In endecrypt this is called a store.
Likewise, the keystore utility works with one level of nesting, making it effectively a key-value store (plain
object to PSON). A possible use case could be to store a set of private keys and certificates in an endecrypt store to
be able to use a common password once to access all the confidential entries. Unlike with other keystores like JKS
there is no item-level access control mechanism, just a global one.
Using the API it is possible to put any form of JSON data into a store, not just plain objects.
The file README.md.crypt has been generated through encrypt README.md -p=123 > README.md.crypt and can be
decrypted using decrypt README.md.crypt -p=123.
endecrypt uses node's stock PBKDF2 implementation which uses HMAC-SHA1 to derive keys. Thus, the effective entropy is 160 bits aligned to 256 bits of AES which may change with future versions (i.e. when the guys at node.js implement SHA256).
License: Apache License, Version 2.0
FAQs
Password based en-/decryption of arbitrary data with and for node.js.
The npm package endecrypt receives a total of 2 weekly downloads. As such, endecrypt popularity was classified as not popular.
We found that endecrypt demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.