
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
epipe是一个方便Web项目调试、检测的开源项目;
监听http请求,观察网络web请求、及参数、数据响应
分析网络性能
调试项目、请求改写、转发
自定义路由
npm install epipe -g
epipe-rules.js直接执行命令epipe即可,规则文件参考epipe/epipe-rules.jsepipe file=custom-rule.js, 文件相对命令当前目录epipe port=8189 mod=fengchao conser
| port | 代理端口 | 默认8188 |
| file | 规则文件 | 以当前路径为相对路径;或指定为绝对路径位置 |
| mod | 规则模块名 | 指定当前使用规则集合 mod=fengchao |
| debug | 调试方式 | 再规则中利用debug切换调试模式 默认false |
| conser | 打开命令行交互 | epipe conser 无需参数 |
epipe port=8189 mod=fengchao file=fengchao-pipe.js
epipe
> listen 8188
> mod fengchao
> debug true
> fiddle fengchao
> include ./rules/fengchao
| listen | 在监听端口创建服务 | listen 8181 ; 创建新的监听端口 |
| include | 加载规则文件 | include fc.js 将规则文件加入规则库 |
| mod | 规则模块名 | mod fengchao 指定当前使用规则集合 |
| debug | 调试方式 | debug true 改变调试模式 |
| showlog | 显示访问日志 | |
| hidelog | 隐藏访问日志 | 默认即隐藏访问日志 |
| help | 显示可用命令及帮助 |
启动本地开发环境,确定能够正常访问
启动 epipe port=8189 mod=fengchao conser
配置本地http代理服务器,不要配置https代理
127.0.0.1 8189访问任意网站,在epipe命令中输入showlog检查是否显示历史记录
访问nirvana / phoenix 是否能够正常访问及显示log
进入联调模式,在epipe 中输入 debug true
debug false 退出联调模式FAQs
epipe - elabrary http-request pipe for debug or monitor
We found that epipe demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.