Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Parse MRZ (Machine Readable Zone) from identity documents.
$ npm install --save mrz
const parse = require('mrz').parse;
let mrz = [
'I<UTOD23145890<1233<<<<<<<<<<<',
'7408122F1204159UTO<<<<<<<<<<<6',
'ERIKSSON<<ANNA<MARIA<<<<<<<<<<'
];
var result = parse(mrz);
console.log(result);
Parses the provided MRZ. The argument can be an array of lines or a single string
including line breaks. This function throws an error if the input is in an
unsupported format. It will never throw an error when there are invalid fields
in the MRZ. Instead, the result.valid
value will be false
and
details about the invalid fields can be found in result.details
.
String identifying the format of the parsed MRZ. Supported formats are:
true
if all fields are valid. false
otherwise.
Object mapping field names to their respective value. The value is set to null
if it is invalid. The value may be different than the raw value. For example
result.fields.sex
will be "male" when the raw value was "M".
Array of objects describing all parsed fields. Its structure is:
result.fields
.null
.line
, start
, end
and raw
.line
.line
.Static mapping of supported formats.
Static mapping of state code to state name.
https://www.icao.int/publications/pages/publication.aspx?docnum=9303
http://www.astra2.admin.ch/media/pdfpub/2003-10-15_2262_f.pdf
FAQs
Parse MRZ (Machine Readable Zone) from identity documents
The npm package mrz receives a total of 8,840 weekly downloads. As such, mrz popularity was classified as popular.
We found that mrz demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.