
Research
Security News
Malicious npm Packages Use Telegram to Exfiltrate BullX Credentials
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
jsdoc-extractor
Advanced tools
Fast JSDoc extractor with no dependencies (parsing directly from Buffer input).
This package is available in the Node Package Repository and can be easily installed with npm or yarn.
$ npm i jsdoc-extractor
# or
$ yarn add jsdoc-extractor
const jsdocExtractor = require("jsdoc-extractor");
const { readFileSync } = require("fs");
const buf = readFileSync("./sourceCode.js");
for (const [doc, start, end] of jsdocExtractor(buf)) {
console.log(`Found a new JSDoc block between ${start} and ${end}`);
console.log(doc.toString());
console.log("-------------");
}
Take a buffer as Argument and return a Synchronous Iterator. The value returned by the iterator is the following:
[buffer, start, end]
Where start and end are the offset to retrieve (slice) the original Buffer.
name | description |
---|---|
jsdoc-tokenizer | Tokenizer for JSDoc blocks |
Thanks goes to these wonderful people (emoji key):
Gentilhomme 💻 📖 🐛 🛡️ |
MIT
FAQs
JSDoc annotations extractor
The npm package jsdoc-extractor receives a total of 3,487 weekly downloads. As such, jsdoc-extractor popularity was classified as popular.
We found that jsdoc-extractor demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.
Security News
AI-generated slop reports are making bug bounty triage harder, wasting maintainer time, and straining trust in vulnerability disclosure programs.