
Research
Supply Chain Attack on Axios Pulls Malicious Dependency from npm
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.
jiesi6-object-server
Advanced tools
create table object_class ( id int(10) unsigned not null auto_increment, create_time datetime not null default current_timestamp, name varchar(255) default null, scope varchar(100) default null, code varchar(100) not null, primary key(id) ) en
#jiesi6-object-server
create table object_class ( id int(10) unsigned not null auto_increment, create_time datetime not null default current_timestamp, name varchar(255) default null, scope varchar(100) default null, code varchar(100) not null, primary key(id) ) engine=innodb auto_increment=10 default charset=utf8mb4; insert into object_class(id, name, code ) values (1, '对象类', 'object_class'), (2, '对象类属性', 'object_class_property');
create table object_class_property ( id int(10) unsigned not null auto_increment, create_time datetime not null default current_timestamp, body_id int(10) unsigned not null, name varchar(255) default null, code varchar(100) not null, type int(11) default null, object_class_id int(10) unsigned default null, foreign_name varchar(255) default null, object_key varchar(255) default null, relation_key varchar(255) default null, unique_key varchar(255) default null, pass_type varchar(255) default null, primary key(id), unique key object_class_property_body_id_code(body_id, code), constraint object_class_property_body_id_foreign foreign key(body_id) references object_class(id) on delete cascade, constraint object_class_property_object_class_id_foreign foreign key(object_class_id) references object_class(id) ) engine=innodb auto_increment=100 default charset=utf8mb4;
insert into object_class_property(id, body_id, name, code, type) values (1, 1, '类名', 'name', 1), (2, 1, '范围', 'scope', 1), (3, 1, '代码', 'code', 1);
insert into object_class_property(id, body_id, name, code, type, object_class_id, object_key, relation_key, unique_key) values (4, 1, '属性', 'property', 200, 2, 'id', 'body_id', 'code');
insert into object_class_property(id, body_id, name, code, type, foreign_name, object_class_id) values (5, 2, '对象', 'body_id', 100, 'object_class_property_body_id_foreign', 1);
insert into object_class_property(id, body_id, name, code, type) values (6, 2, '属性名', 'name', 1), (7, 2, '代码', 'code', 1), (8, 2, '类型', 'type', 2);
insert into object_class_property(id, body_id, name, code, type, foreign_name, object_class_id) values (9, 2, '关联对象', 'object_class_id', 100, 'object_class_property_object_class_id_foreign', 1);
insert into object_class_property(id, body_id, name, code, type) values (10, 2, '外键名', 'foreign_name', 1), (11, 2, '当前对象中的关联键', 'object_key', 1), (12, 2, '集合对象中的关联键', 'relation_key', 1), (13, 2, '集合对象的唯一键', 'unique_key', 1), (14, 2, '通道类型', 'pass_type', 1);
FAQs
create table object_class ( id int(10) unsigned not null auto_increment, create_time datetime not null default current_timestamp, name varchar(255) default null, scope varchar(100) default null, code varchar(100) not null, primary key(id) ) en
We found that jiesi6-object-server demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.

Security News
TeamPCP is partnering with ransomware group Vect to turn open source supply chain attacks on tools like Trivy and LiteLLM into large-scale ransomware operations.