Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
When calling this module a Promise library will be returned if one is available.
This module will not declare any dependencies, you should install a fallback library downstream if needed.
npm install --save i-promise
var Promise = require('i-promise');
if (!Promise) throw new Error('No ES6 Promise Library Available.');
return Promise.resolve('success')
In a browser (via browserify), it will return either window.Promise
, window.Q.Promise
or window.Q.promise
in that order, you should have an es6-promise shim or the Q library loaded globally in the browser if you need promises in older browsers.
In node, attempts to use the following will be made.
Promise
(newer versions of node.js)Promise
then promise
)Default behavior is to always favor native implementation if found. You can still favor the implementation of your choice without overriding global Promise
:
require('i-promise/config').use(MyPromiseImplementation);
You must run this code before any call to require('i-promise')
.
FAQs
Returns an available ES6 Promise implementation, browserify friendly.
We found that i-promise demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.