
Research
PyPI Package Disguised as Instagram Growth Tool Harvests User Credentials
A deceptive PyPI package posing as an Instagram growth tool collects user credentials and sends them to third-party bot services.
Supply Chain Security
Vulnerability
Quality
Maintenance
License
Unpopular package
QualityThis package is not very popular.
Found 1 instance in 1 package
High CVE
Simple wrapper around the v1 Instagram API
$ npm install ig
ig
needs to know about your applications client ID and client secret.
You can configure it like this:
ig
.set('client id', clientId)
.set('client secret', clientSecret);
ig
does not do any authentication and expects you to implement the
oAuth2 authentication flow yourself.
After getting a users access token you can configure ig
like such:
ig.set('token', accessToken);
Instagram user class wrap where opts
is:
id
- ID of the user to wrapvar ig = require('ig')
var user = ig.User({id: 123});
Retrieves feed for the authenticated user.
ig.User.feed()
.on('error', onerror)
.on('end', function (feed) {
// do something with `feed'
});
Retrieves liked media for the authenticated user.
ig.User.likedMedia()
.on('error', onerror)
.on('end', function (media) {
// do something with `media'
});
Search for a user
ig.User.likedMedia()
.on('error', onerror)
.on('end', function (media) {
// do something with `media'
});
more to come...
MIT
FAQs
Wraps the Instagram v1 API
The npm package ig receives a total of 153 weekly downloads. As such, ig popularity was classified as not popular.
We found that ig demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A deceptive PyPI package posing as an Instagram growth tool collects user credentials and sends them to third-party bot services.
Product
Socket now supports pylock.toml, enabling secure, reproducible Python builds with advanced scanning and full alignment with PEP 751's new standard.
Security News
Research
Socket uncovered two npm packages that register hidden HTTP endpoints to delete all files on command.