
Security News
/Research
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
programmatic tool for load-testing in node-js for scenarios with heavy logic.
Parameterizing of parts in request descriptors are done using the tsung placeholders style,
i.e using placeholders wrapped with %%_
and %%
, example: %%_param1%%
will replace this expression with the value in agent.params.param1
.
agent.params
collection starts as a clone of the macro.options.params
provided by the user.
User may manipulate the agent.params
using onResponse(err, response)
hook,
which is called on a context with reference to agent
.
Note in the following example how the 2nd request adds to the cart the product-id returned by the 1st request.
module.exports =
{ options:
{ params:
{ env: "stage"
}
, scenario:
[ { type: "req"
req :
[ "http://%%_env%%.mydomain.com/promo-data"
]
, onResponse: function(e, r) {
if (e) throw e;
this.agent.params.product = JSON.parse(r.body).product
}
}
, { type: "wait", wait: 1500 }
, { type: "req"
req:
[ { method: "POST"
, url: "http://%%_env%%.mydomain.com/addToChart"
, body: {
pid: "%%_product%%"
}
}
]
}
]
}
}
TBD
FAQs
logiload ==========
The npm package logiload receives a total of 0 weekly downloads. As such, logiload popularity was classified as not popular.
We found that logiload demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.