Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
magmastream
Advanced tools
Magmastream a lavalink wrapper for NodeJs. Magmastream only supports lavalink version 4.
We appreciate contributions to enhance Magmastream. If you find any bugs or have suggestions for improvements, please feel free to contribute by following these steps:
Your contributions will help make the Magmastream even better!
If you have identified any bugs and have fixed them, we encourage you to contribute by creating a pull request. We appreciate your effort in improving the stability and reliability of Magmastream.
If you need any assistance or have questions, please open create an issue with your question. Also you can join the Discord Support Server.
Name | Creator |
---|---|
Lava Jukebox | Abel Purnwasy |
Stal | memte |
Lunio | vexi |
JukeDisc | Theo |
If you want to add your own bot create a pull request with your bot added. Please add your full name.
Special thanks to the all the contributors who have helped make Magmastream even better!
FAQs
A user-friendly Lavalink client designed for NodeJS.
The npm package magmastream receives a total of 89 weekly downloads. As such, magmastream popularity was classified as not popular.
We found that magmastream demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.