Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
mp3-duration
Advanced tools
Calculate duration of an MP3
$ npm install --save mp3-duration
var mp3Duration = require('mp3-duration');
mp3Duration('file.mp3', function (err, duration) {
if (err) return console.log(err.message);
console.log('Your file is ' + duration + ' seconds long');
});
Type: string
| Buffer
Path to the file or a buffer with the file's contents
Defaults to false
. When set to true
, will estimate the length of a
constant-bitrate mp3. This speeds up the calculation a lot but isn't
guaranteed to be accurate.
Type: function
Callback to be called once duration is calculated. It's also possible to
instead use the returned Promise
. duration
is the duration of the
mp3 in ms
.
mp3Duration
returns a Promise that resolves to the duration of the mp3 in ms
or rejects with some error.
MIT © Han de Boer
FAQs
Get the duration of an MP3 file
The npm package mp3-duration receives a total of 3,350 weekly downloads. As such, mp3-duration popularity was classified as popular.
We found that mp3-duration demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.