
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
m2m is a client module for machine-to-machine communication framework node-m2m for cloud and edge computing.
m2m is a node.js communication library for developing client-server or pub-sub applications using the machine-to-machine and edge framework node-m2m.
Its simple api and software-defined computing environment makes it easy to create any distributed applications requiring a secure networking path that can traverse any regional and local area network boundaries using the public internet and private LANs.
Create m2m applications where endpoints distributed around the globe communicate and exchange data traversing the internet/WAN using a combination of http and websocket protocol.
Create edge applications where endpoints communicate through local area networks using tcp or udp protocol for a super-fast low latency edge computing environment.
Access to endpoints is restricted to authenticated and authorized users only.
All communications traffic between endpoints are encrypted using TLS or hybrid encryption based on NIST.
To use this library, users will need to register with node-m2m.
Start your first m2m application from the quick tour guide.
$ npm install m2m
FAQs
m2m is a client module for machine-to-machine communication framework node-m2m for cloud and edge computing.
The npm package m2m receives a total of 24 weekly downloads. As such, m2m popularity was classified as not popular.
We found that m2m demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.