Socket
Socket
Sign inDemoInstall

jws

Package Overview
Dependencies
22
Maintainers
3
Versions
23
Alerts
File Explorer

Advanced tools

Install Socket

Detect and block malicious and high-risk dependencies

Install
Previous13Next

3.0.0

Diff

Changelog

Source

[3.0.0]

Changed

  • BREAKING: jwt.verify now requires an algorithm parameter, and jws.createVerify requires an algorithm option. The "alg" field signature headers is ignored. This mitigates a critical security flaw in the library which would allow an attacker to generate signatures with arbitrary contents that would be accepted by jwt.verify. See https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/ for details.
brianloveswords
published 2.0.0 •

Changelog

Source

[2.0.0] - 2015-01-30

Changed

  • BREAKING: Default payload encoding changed from binary to utf8. utf8 is a is a more sensible default than binary because many payloads, as far as I can tell, will contain user-facing strings that could be in any language. (<code>[6b6de48]</code>)

  • Code reorganization, thanks [@fearphage]! (<code>[7880050]</code>)

Added

  • Option in all relevant methods for encoding. For those few users that might be depending on a binary encoding of the messages, this is for them. (<code>[6b6de48]</code>)
brianloveswords
published 1.0.1 •

brianloveswords
published 1.0.0 •

brianloveswords
published 0.2.6 •

brianloveswords
published 0.2.5 •

brianloveswords
published 0.2.4 •

brianloveswords
published 0.2.3 •

brianloveswords
published 0.2.2 •

brianloveswords
published 0.2.1 •

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc