Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
jupyter-jaeger
Advanced tools
This adds support for using the Jaeger distributed tracing tool with Jupyter. It facilitates the use case of tracking some process that starts in a kernel and is continued in a mime renderer.
We are using it to profile and debug ibis-vega-transform
which goes back and forth between the kernel and the frontend to interactively render charts with Altair.
Installing this adds two Jupyter server extensions that start up the jaeger-all-in-one
and jaeger-browser
processes when you launch Jupyter.
So to use it you must first instrument code in your kernel and/or in the frontend to record traces.
It also provis a NPM Typescript plugin you can use to access the client from inside a JupyterLab extension.
# Install jaeger-all-in-one binary
conda install -c conda-forge jaeger
# Install this package and teh REST API
pip install jupyter-jaeger jaeger_browser
# Optional, to see Jaeger icon in JupyterLab launcherr
jupyter labextension install jupyterlab-server-proxy-saulshanabrook
# Launch a Jupyter server
jupyter lab
# Open the jaeger UI
open http://localhost:8080/jaeger
This repo also includes an example of starting a trace from a kernel and continueing it in a mimeredenr jupyterlab extension,
in ./example
. You can try this example by:
FAQs
A library for saving traces to jaeger
The npm package jupyter-jaeger receives a total of 3 weekly downloads. As such, jupyter-jaeger popularity was classified as not popular.
We found that jupyter-jaeger demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.