
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
This is a node API for Feedly
Install from NPM:
npm install --save feedly
Create an instance:
var Feedly = require 'feedly'
var f = new Feedly({
client_id: 'MY_CLIENT_ID',
client_secret: 'MY_CLIENT_SECRET'
port: 8080
});
Use the sandbox:
var Feedly = require 'feedly'
var f = new Feedly({
client_id: 'sandbox',
client_secret: 'Get the current secret from http://developer.feedly.com/v3/sandbox/'
base: 'http://sandbox.feedly.com'
port: 8080
});
The first non-trivial method call you make to the object will cause your
default browser to pop up asking you to log in. When that process is complete,
you will see a page served from http://localhost:8080/, which you can close.
After that point, you won't need to log in again until your token expires
(without your having called refresh
in the meantime).
WARNING: by default, this will store your auth token and refresh token in
~/.feedly
, unencrypted. Set the config_file
options to null to prevent this
behavior, but you will have to log in through the web site each time you create
a new Feedly
instance.
Each method takes an optional node-style (error, results)
callback. If you
prefer a promise-style
approach, you do without a callback, like this:
f.reads().then(function(results) {
// process results
},
function (error) {
// process error
});
Full documentation for the API can be found here.
FAQs
feedly.com API
We found that feedly demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.