
Research
Security News
Malicious npm Packages Use Telegram to Exfiltrate BullX Credentials
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
evm-proxy-detection
Advanced tools
Detect proxy contracts and their target addresses using en EIP-1193 compatible JSON-RPC request function
Detect proxy contracts and their target addresses using an EIP-1193 compatible JSON-RPC request
function
This package offers a utility function for checking if a smart contract at a given address implements one of the known proxy patterns. It detects the following kinds of proxies:
This module is distributed via npm. For adding it to your project, run:
npm install --save evm-proxy-detection
To install it using yarn, run:
yarn add evm-proxy-detection
The function requires an EIP-1193 compatible request
function that it uses to make JSON-RPC requests to run a set of checks against the given address.
It returns a promise that resolves to the proxy target address, i.e., the address of the contract implementing the logic.
The promise resolves to null
if no proxy can be detected.
import { InfuraProvider } from '@ethersproject/providers'
import detectProxyTarget from 'evm-proxy-detection'
const infuraProvider = new InfuraProvider(1, process.env.INFURA_API_KEY)
const requestFunc = ({ method, params }) => infuraProvider.send(method, params)
const target = await detectProxyTarget(
'0xA7AeFeaD2F25972D80516628417ac46b3F2604Af',
requestFunc
)
console.log(target) // logs "0x4bd844F72A8edD323056130A86FC624D0dbcF5b0"
Web3.js doesn't have a way to export an EIP1193 provider, so you need to ensure that the underlying provider you use is EIP1193 compatible. Most Ethereum-supported browsers like MetaMask and TrustWallet have an EIP-1193 compliant provider. Otherwise, you can use providers like eip1193-provider.
import Web3 from 'web3'
import detectProxyTarget from 'evm-proxy-detection'
const web3 = new Web3(Web3.givenProvider || 'ws://localhost:8545')
const target = await detectProxyTarget(
'0xA7AeFeaD2F25972D80516628417ac46b3F2604Af',
web3.currentProvider.request
)
console.log(target) // logs "0x4bd844F72A8edD323056130A86FC624D0dbcF5b0"
detectProxyTarget(address: string, jsonRpcRequest: EIP1193ProviderRequestFunc, blockTag?: BlockTag): Promise<string | null>
Arguments
address
(string): The address of the proxy contractjsonRpcRequest
(EIP1193ProviderRequestFunc): A JSON-RPC request function, compatible with EIP-1193 ((method: string, params: any[]) => Promise<any>
)blockTag
(optional: BlockTag): "earliest"
, "latest"
, "pending"
or hex block number, default is "latest"
The function returns a promise that will generally resolve to either the detected target contract address (non-checksummed) or null
if it couldn't detect one.
FAQs
Detect proxy contracts and their target addresses using an EIP-1193 compatible JSON-RPC request function
The npm package evm-proxy-detection receives a total of 2,782 weekly downloads. As such, evm-proxy-detection popularity was classified as popular.
We found that evm-proxy-detection demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.
Security News
AI-generated slop reports are making bug bounty triage harder, wasting maintainer time, and straining trust in vulnerability disclosure programs.