
Research
Malicious npm Package Brand-Squats TanStack to Exfiltrate Environment Variables
A brand-squatted TanStack npm package used postinstall scripts to steal .env files and exfiltrate developer secrets to an attacker-controlled endpoint.
Is this value a JS Map? This module works cross-realm/iframe, and despite ES6 @@toStringTag.
Is this value a JS Map? This module works cross-realm/iframe, and despite ES6 @@toStringTag.
var isMap = require('is-map');
assert(!isMap(function () {}));
assert(!isMap(null));
assert(!isMap(function* () { yield 42; return Infinity; });
assert(!isMap(Symbol('foo')));
assert(!isMap(1n));
assert(!isMap(Object(1n)));
assert(!isMap(new Set()));
assert(!isMap(new WeakSet()));
assert(!isMap(new WeakMap()));
assert(isMap(new Map()));
class MyMap extends Map {}
assert(isMap(new MyMap()));
Simply clone the repo, npm install, and run npm test
The `is` package offers a comprehensive set of type-checking utilities, including the ability to check if a value is a Map. Compared to `is-map`, `is` provides a broader range of type checks, making it a more versatile choice for projects that require extensive type validation.
Part of the Lodash library, `lodash.ismap` offers functionality similar to `is-map` by providing a method to check if a value is classified as a Map object. While `is-map` focuses solely on Map type checking, `lodash.ismap` benefits from being part of the larger Lodash ecosystem, which includes a wide array of utility functions for different data types.
FAQs
Is this value a JS Map? This module works cross-realm/iframe, and despite ES6 @@toStringTag.
The npm package is-map receives a total of 38,054,619 weekly downloads. As such, is-map popularity was classified as popular.
We found that is-map demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
A brand-squatted TanStack npm package used postinstall scripts to steal .env files and exfiltrate developer secrets to an attacker-controlled endpoint.

Research
Compromised SAP CAP npm packages download and execute unverified binaries, creating urgent supply chain risk for affected developers and CI/CD environments.

Company News
Socket has acquired Secure Annex to expand extension security across browsers, IDEs, and AI tools.