
Research
/Security News
9 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads
Socket researchers discovered nine malicious NuGet packages that use time-delayed payloads to crash applications and corrupt industrial control systems.
mysql-faker
Advanced tools
This module uses the excellent faker.js to easily generate data to populate MySQL database with fake data.
For now, the module assumes that all tables already exist.
To start, create an instance of the Table class giving a name and the number of entities to generate.
Faker types can then be chained on this class to add columns to the database.
All types are functions on the Table class with an underscore character between the type category and name.
For example, faker.name.firstName() is equivalent to table.name_firstName.
The first parameter to the type is the name of the column and any additional parameters are passed on to faker.
var mysql_faker = require('mysql-faker');
var users = (new mysql_faker.Table('users', 1000000));
users.name_firstName('firstname')
.name_lastName('lastname')
mysql_faker.insert([users]);
FAQs
A simple use of faker.js to populate MySQL database tables
We found that mysql-faker demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
/Security News
Socket researchers discovered nine malicious NuGet packages that use time-delayed payloads to crash applications and corrupt industrial control systems.

Security News
Socket CTO Ahmad Nassri discusses why supply chain attacks now target developer machines and what AI means for the future of enterprise security.

Security News
Learn the essential steps every developer should take to stay secure on npm and reduce exposure to supply chain attacks.