Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
grpc-getting-started
Advanced tools
Demonstration of the use of gRPC and front-end.
The envoy.yaml file configures Envoy to listen to browser requests at port 12345
, and forward them to port 9090
.
$ npm run proxy
9090
)10005
)run following command to test:
$ npm run start
When these are all ready, you can open a browser tab and navigate to http://localhost:10005
.proto
file and generate a .js
file we can recognize.$ npm run build:protos
It will generate a js file dist/client-main.js
and a html file dist/index.html
$ npm run build:client
This file is to call with <script>
, which is used as the interface of gRPC API.
Execute the build command below, it will generate a js file dist-api/api-main.js
and a html file dist-api/index.html
$ npm run build:api-prod
or
$ npm run build:api-dev
Next, Use api-main.js
to call the interface and run following command:
$ npm run proxy
$ npm run test:api
Visit http://localhost:4002
to test, it will output in the console: "Hello: string 1 string 2"
Licensed under the MIT.
FAQs
Demonstration of the use of gRPC and front-end
The npm package grpc-getting-started receives a total of 5 weekly downloads. As such, grpc-getting-started popularity was classified as not popular.
We found that grpc-getting-started demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.