Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
infisical-node
Advanced tools
Open-source, end-to-end encrypted tool to manage secrets and configs across your team and infrastructure.
This is now considered a legacy SDK, as we have released a new SDK that will be receiving all future updates. You can find it here.
import express from "express";
import InfisicalClient from "infisical-node";
const app = express();
const PORT = 3000;
const client = new InfisicalClient({
token: "YOUR_INFISICAL_TOKEN"
});
app.get("/", async (req, res) => {
// access value
const name = await client.getSecret("NAME", {
environment: "dev",
path: "/",
type: "shared"
});
res.send(`Hello! My name is: ${name.secretValue}`);
});
app.listen(PORT, async () => {
// initialize client
console.log(`App listening on port ${port}`);
});
This example demonstrates how to use the Infisical Node SDK with an Express application. The application retrieves a secret named "NAME" and responds to requests with a greeting that includes the secret value.
It is also possible to use the SDK to encrypt/decrypt text; the implementation uses aes-256-gcm
with components of the encryption/decryption encoded in base64
.
import InfisicalClient from "infisical-node";
const client = new InfisicalClient();
// some plaintext you want to encrypt
const plaintext = "The quick brown fox jumps over the lazy dog";
// create a base64-encoded, 256-bit symmetric key
const key = client.createSymmetricKey();
// encrypt
const { ciphertext, iv, tag } = client.encryptSymmetric(plaintext, key);
// decrypt
const cleartext = client.decryptSymmetric(ciphertext, key, iv, tag);
$ npm install infisical-node
Import the SDK and create a client instance with your Infisical Token.
const InfisicalClient = require("infisical-node");
const client = new InfisicalClient({
token: "your_infisical_token"
});
Using ES6:
import InfisicalClient from "infisical-node";
const client = new InfisicalClient({
token: "your_infisical_token"
});
// your app logic
Using Infisical Token V3 (Beta):
In v1.4.0
, we released a superior token authentication method; this credential is a JSON containing a publicKey
, privateKey
, and serviceToken
and can be used to initialize the Node SDK client instead of the regular service token.
You can use this beta feature like so:
const InfisicalClient = require("infisical-node");
const client = new InfisicalClient({
tokenJson: "your_infisical_token_v3_json"
});
Parameter | Type | Description |
---|---|---|
token | string | An Infisical Token scoped to a project and environment(s). |
tokenJson | string | An Infisical Token V3 JSON scoped to a project and environment(s) - in beta |
siteURL | string | Your self-hosted Infisical site URL. Default: https://app.infisical.com . |
cacheTTL | number | Time-to-live (in seconds) for refreshing cached secrets. Default: 300 . |
debug | boolean | Turns debug mode on or off. Default: false . |
The SDK caches every secret and updates it periodically based on the provided cacheTTL
. For example, if cacheTTL
of 300
is provided, then a secret will be refetched 5 minutes after the first fetch; if the fetch fails, the cached secret is returned.
const secrets = await client.getAllSecrets({
environment: "dev",
path: "/foo/bar/",
attachToProcessEnv: false,
includeImports: false
});
Retrieve all secrets within a given environment and folder path. The service token used must have access to the given path and environment.
options
(object)
environment
The slug name (dev, prod, etc) of the environment from where secrets should be fetched frompath
The path from where secrets should be fetched fromattachToProcessEnv
(boolean, optional): Whether or not to attach fetched secrets to process.env
. If not specified, the default value is false
.includeImports
(boolean, optional): Whether or not to include imported secrets from the current path. Read about secret import.Retrieve a secret from Infisical:
const secret = await client.getSecret("API_KEY", {
environment: "dev",
path: "/",
type: "shared"
});
const value = secret.secretValue; // get its value
By default, getSecret()
fetches and returns a personal secret. If not found, it returns a shared secret, or tries to retrieve the value from process.env
. If a secret is fetched, getSecret()
caches it to reduce excessive calls and re-fetches periodically based on the cacheTTL
option (default is 300
seconds) when initializing the client — for more information, see the caching section.
To explicitly retrieve a shared secret:
const secret = await client.getSecret("API_KEY", {
environment: "dev",
path: "/",
type: "shared"
});
const value = secret.secretValue; // get its value
secretName
(string): The key of the secret to retrieve.options
(object, optional): An options object to speify the type of secret.
environment
The slug name (dev, prod, etc) of the environment from where secrets should be fetched frompath
The path from where secrets should be fetched fromtype
(string, optional): The type of the secret. Valid options are "shared" or "personal". If not specified, the default value is "personal".Create a new secret in Infisical:
const newApiKey = await client.createSecret("API_KEY", "FOO", {
environment: "dev",
path: "/",
type: "shared"
});
secretName
(string): The key of the secret to create.secretValue
(string): The value of the secret.options
(object, optional): An options object to specify the type of secret.
environment
The slug name (dev, prod, etc) of the environment where secret should be createdpath
The path from where secret should be created.type
(string, optional): The type of the secret. Valid options are "shared" or "personal". If not specified, the default value is "shared". A personal secret can only be created if a shared secret with the same name exists.Update an existing secret in Infisical:
const updatedApiKey = await client.updateSecret("API_KEY", "BAR", {
environment: "dev",
path: "/",
type: "shared"
});
secretName
(string): The key of the secret to update.secretValue
(string): The new value of the secret.options
(object, optional): An options object to specify the type of secret.
environment
The slug name (dev, prod, etc) of the environment where secret should be updated.path
The path from where secret should be updated.type
(string, optional): The type of the secret. Valid options are "shared" or "personal". If not specified, the default value is "shared".Delete a secret in Infisical:
const deletedSecret = await client.deleteSecret("API_KEY", {
environment: "dev",
path: "/",
type: "shared"
});
secretName
(string): The key of the secret to delete.options
(object, optional): An options object to specify the type of secret to delete.
environment
The slug name (dev, prod, etc) of the environment where secret should be deleted.path
The path from where secret should be deleted.type
(string, optional): The type of the secret. Valid options are "shared" or "personal". If not specified, the default value is "shared". Note that deleting a shared secret also deletes all associated personal secrets.Create a base64-encoded, 256-bit symmetric key to be used for encryption/decryption.
const key = client.createSymmetricKey();
key
(string): A base64-encoded, 256-bit symmetric key.
Encrypt plaintext -> ciphertext.
const { ciphertext, iv, tag } = client.encryptSymmetric(plaintext, key);
plaintext
(string): The plaintext to encrypt.key
(string): The base64-encoded, 256-bit symmetric key to use to encrypt the plaintext
.An object containing the following properties:
ciphertext
(string): The base64-encoded, encrypted plaintext
.iv
(string): The base64-encoded, 96-bit initialization vector generated for the encryption.tag
(string): The base64-encoded authentication tag generated during the encryption.Decrypt ciphertext -> plaintext/cleartext.
const cleartext = client.decryptSymmetric(ciphertext, key, iv, tag);
ciphertext
(string): The ciphertext to decrypt.key
(string): The base64-encoded, 256-bit symmetric key to use to decrypt the ciphertext
.iv
(string): The base64-encoded, 96-bit initiatlization vector generated for the encryption.tag
(string): The base64-encoded authentication tag generated during encryption.cleartext
(string): The decrypted encryption that is the cleartext/plaintext.
Bug fixes, docs, and library improvements are always welcome. Please refer to our Contributing Guide for detailed information on how you can contribute.
If you want to familiarize yourself with the SDK, you can start by forking the repository and cloning it in your local development environment. The project requires Node.js to be installed on your machine.
After cloning the repository, install the depenencies by running the following command in the directory of your cloned repository:
$ npm install
To run existing tests, you need to make a .env
at the root of this project containing a INFISICAL_TOKEN
and SITE_URL
. This will execute the tests against a project and environment scoped to the INFISICAL_TOKEN
on a running instance of Infisical at the SITE_URL
(this could be Infisical Cloud).
To run all the tests you can use the following command:
$ npm test
infisical-node
is distributed under the terms of the MIT license.
FAQs
Open-source, end-to-end encrypted too
The npm package infisical-node receives a total of 17,628 weekly downloads. As such, infisical-node popularity was classified as popular.
We found that infisical-node demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.