
Research
lightning PyPI Package Compromised in Supply Chain Attack
Socket detected a malicious supply chain attack on PyPI package lightning versions 2.6.2 and 2.6.3, which execute credential-stealing malware on import.
A tiny (174B) library to detect `offline` status & respond to changes in the browser.
A tiny (174B) library to detect
offlinestatus & respond to changes in the browser.
This module exposes three module definitions:
dist/is-offline.es.jsdist/is-offline.jsdist/is-offline.min.jsIf using the UMD bundle, the library is exposed as is-offline globally.
$ npm install --save is-offline
import { check, watch } from 'is-offline';
let foobar = bool => console.log('Am I offline?', bool);
// Check if currently offline
check().then(foobar);
// Setup a "watcher" to respond to all online/offline changes
let unwatch = watch(foobar);
// The "watcher" will be active until it's deactivated
unwatch();
Returns: Promise
Resolves a Boolean to indicate offline status. For clarity, true means that you are offline.
Returns: Function
Returns a function that is used to disable/unmount the event listeners.
Type: Function
The function to run whenever the network status changes. It receives a Boolean value, just like isOffline.
MIT © Luke Edwards
FAQs
A tiny (174B) library to detect `offline` status & respond to changes in the browser.
The npm package is-offline receives a total of 6,598 weekly downloads. As such, is-offline popularity was classified as popular.
We found that is-offline demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Socket detected a malicious supply chain attack on PyPI package lightning versions 2.6.2 and 2.6.3, which execute credential-stealing malware on import.

Research
A brand-squatted TanStack npm package used postinstall scripts to steal .env files and exfiltrate developer secrets to an attacker-controlled endpoint.

Research
Compromised SAP CAP npm packages download and execute unverified binaries, creating urgent supply chain risk for affected developers and CI/CD environments.