
Research
5 Malicious Chrome Extensions Enable Session Hijacking in Enterprise HR and ERP Systems
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.
jsdoc-tokenizer
Advanced tools
Tokenizer (Scanner) for JSDoc. This project only operate on/with Node.js Buffer and Uint8Array (No conversion to String required).
This package is available in the Node Package Repository and can be easily installed with npm or yarn.
$ npm i jsdoc-tokenizer
# or
$ yarn add jsdoc-tokenizer
const { scan, TOKENS } = require("jsdoc-tokenizer");
const it = scan(Buffer.from("/** @type {String} **/"));
for (const [token, value] of it) {
if (value instanceof Uint8Array) {
console.log(token, String.fromCharCode(...value));
}
else {
const tValue = typeof value === "number" ? String.fromCharCode(value) : value;
console.log(token, tValue);
}
}
Scan (tokenize) JSDoc block. The scanner only take single instance of block (not build to detect start and end). To extract JSDoc block as buffer, please take a look at jsdoc-extractor.
Available tokens are described by the following interface:
interface Tokens {
KEYWORD: Symbol,
IDENTIFIER: Symbol,
SYMBOL: Symbol
}
Tokens are exported in the module.
@ that must be preceded by *\s.MIT
FAQs
Tokenize (Scan) JSDoc buffer
We found that jsdoc-tokenizer demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.

Research
Node.js patched a crash bug where AsyncLocalStorage could cause stack overflows to bypass error handlers and terminate production servers.

Research
/Security News
A malicious Chrome extension steals newly created MEXC API keys, exfiltrates them to Telegram, and enables full account takeover with trading and withdrawal rights.