
Research
/Security News
Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader
North Korean threat actors deploy 67 malicious npm packages using the newly discovered XORIndex malware loader.
The hasNestedProperty method missing in Object. This module does not extend Object.
var hasNestedProperty = require('hnp');
var o = {
lol : {
yes : 'why?'
}
};
// hasNestedProperty(object,path)
if(hasNestedProperty(o,'lol.yes')) console.log('yes property is there');
if(hasNestedProperty(o,'lol.no') === false) console.log('no property is not available');
Copyright(C) 2012-2015 Rémy Loubradou
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE Version 2, December 2004
Copyright (C) 2004 Sam Hocevar sam@hocevar.net
Everyone is permitted to copy and distribute verbatim or modified copies of this license document, and changing it is allowed as long as the name is changed.
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
FAQs
The hasNestedProperty method missing in Object. This module does not extend Object.
The npm package hnp receives a total of 4,360 weekly downloads. As such, hnp popularity was classified as popular.
We found that hnp demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
North Korean threat actors deploy 67 malicious npm packages using the newly discovered XORIndex malware loader.
Security News
Meet Socket at Black Hat & DEF CON 2025 for 1:1s, insider security talks at Allegiant Stadium, and a private dinner with top minds in software supply chain security.
Security News
CAI is a new open source AI framework that automates penetration testing tasks like scanning and exploitation up to 3,600× faster than humans.