
Security News
vlt Launches "reproduce": A New Tool Challenging the Limits of Package Provenance
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
The agent has the following responsibilities:
REST based operations
Provide public URIs for infered assets.
Invoke the EYE reasoner
A small interpreter for dynamic operations on workspaces
docker build -t cvasquez/hydra-eye .
(to build a clean image from scratch use the --no-cache option)
Start HydraEye on host port 3000:
docker run --name=hydra-eye -p 3000:3000 -v $PWD/workspace:/usr/src/app/workspace cvasquez/hydra-eye
Running your image with -d runs the container in detached mode, leaving the container running in the background. The -p flag redirects a public port to a private port inside the container. The -v flag mounts a directory to a directory inside the container.
If you need to go inside the container you can use the exec command:
# Enter the container
docker exec -it hydra-eye /bin/bash
docker rm -f hydra-eye
curl -i localhost:3000
First of all, you need to install the EYE reasoner (Windows – OS X – Linux).
(make sure that you can run this using '/bin/sh eye', or set the EYE_PATH environment variable)
$ npm start
FAQs
H-Eye Dataspaces
We found that h-eye demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
Research
Security News
Socket researchers uncovered a malicious PyPI package exploiting Deezer’s API to enable coordinated music piracy through API abuse and C2 server control.
Research
The Socket Research Team discovered a malicious npm package, '@ton-wallet/create', stealing cryptocurrency wallet keys from developers and users in the TON ecosystem.