Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
homebridge-tuya-05teve
Advanced tools
🏠 Offical Homebridge plugin for TuyAPI - Fork of iRayanKhan's plugin to test publishing steps.
Control your supported Tuya accessories locally in HomeKit
Click the number next to your device to find the possible DataPoint "DP" values, then add as needed to your config.
Note: Motion, and other sensor types don't behave well with responce requests, so they will not be added.
Search for "Tuya" in homebridge-config-ui-x and install homebridge-tuya
.
sudo npm install -g homebridge-tuya
UI
Manual
If you have new accessory logic for a new device, please add a function defined by manufacturer, and describe your changes in the readME file.
config.schema.json
, fixed dependencies, and helped inspire this readME off his gsh plugin.Please donate to a local pet shelter, or food pantry. It's been a wild time, but we can do our part by helping others.
FAQs
🏠 Offical Homebridge plugin for TuyAPI - Fork of iRayanKhan's plugin to test publishing steps.
The npm package homebridge-tuya-05teve receives a total of 5 weekly downloads. As such, homebridge-tuya-05teve popularity was classified as not popular.
We found that homebridge-tuya-05teve demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.