
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
linkedin-search
Advanced tools
linkedin-search is an OSINT tool built for Node.js Search LinkedIn for user accounts by email address.
$ npm install linkedin-search -g
In order to search for user accounts using an email address, you need to be logged into LinkedIn with a valid account. You can use any account for this as long as you have the username and password.
$ linkedin --help
Usage: -u <yourEmail> -p <yourPass> -f <emailToFind>
Options:
--help Show help [boolean]
--version Show version number [boolean]
-u, --username Your LinkedIn username for authentication [string] [required]
-p, --password Your LinkedIn password for authentication [string] [required]
-f, --find Email to search for LinkedIn account [string] [required]
$ linkedin -u myemail@email.com -p mypassword123 -f searchfor@email.com
linkedin-search returns an object if a user account was found:
{
email: 'searchfor@email.com',
first_name: 'John',
last_name: 'Smith',
location: 'Los Angeles, CA',
profile: 'https://www.linkedin.com/in/john-smith-9x547813'
}
MIT © Tyler Colwell
FAQs
OSINT username search tool for LinkedIn.
We found that linkedin-search demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.