Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
libp2p-kad-dht
Advanced tools
JavaScript implementation of the Kademlia DHT for libp2p, based on go-libp2p-kad-dht.
> npm i libp2p-kad-dht
const KadDHT = require('libp2p-kad-dht')
See https://libp2p.github.io/js-libp2p-kad-dht for the auto generated docs.
The libp2p-kad-dht module offers 3 APIs: Peer Routing, Content Routing and Peer Discovery.
libp2p-kad-dht
provides a discovery service called Random Walk
(random walks on the DHT to discover more nodes). It is accessible through dht.randomWalk
and exposes the Peer Discovery interface.
A summary of the algorithms and API for this implementation of Kademlia.
Feel free to join in. All welcome. Open an issue!
This repository falls under the IPFS Code of Conduct.
MIT - Protocol Labs 2017
0.19.3 (2020-05-15)
<a name="0.19.2"></a>
FAQs
JavaScript implementation of the Kad-DHT for libp2p
The npm package libp2p-kad-dht receives a total of 1,590 weekly downloads. As such, libp2p-kad-dht popularity was classified as popular.
We found that libp2p-kad-dht demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.