Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
http-attach
Advanced tools
write services that attach to existing httpServer instances
Let's say you want to write a small module of functionality - responding to a single http route, for example - and want to give the module a way to register itself without depending on a specific framework, like connect, express, or hapi.
This lets you implement functionality like socket.io's `socketio.attach(httpServer)``
var httpAttach = require('http-attach')
function middleware (req, res, next) {
console.log('this middleware is neat & useful')
next()
}
middleware.attach = function (httpServer) {
httpAttach(httpServer, middleware)
}
module.exports = middleware
httpServer
should be an HttpServer
or HttpsServer
instance.
This replaces the existing request
event handler so you can additional control point for your program logic. You can yield to the existing handler by calling the next()
function you get as the third argument, like connect-style middleware.
If there is no existing request handler, calling next()
will end the request with a 404 status code.
$ npm install http-attach
From package root:
$ npm install
$ npm test
Apache 2.0. (c) 2016 Zendesk, Inc. See LICENSE.md
FAQs
write services that attach to existing httpServer instances
We found that http-attach demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.