
Research
/Security News
Intercom’s npm Package Compromised in Ongoing Mini Shai-Hulud Worm Attack
Compromised intercom-client@7.0.4 npm package is tied to the ongoing Mini Shai-Hulud worm attack targeting developer and CI/CD secrets.
n8n-nodes-google-service-account-dynamic-impersonate
Advanced tools
This package provides better Google Services credentials for n8n, by allowing to customize the delegation from the HTTP node directly.
This is an n8n community credential. It lets you use the Google Services Account API in your workflows but allows you overwriting the user to impersonate.
This is useful for scenarios where, for example, you want to set a company-wide signature in Gmail for all users.
n8n is a fair-code licensed workflow automation platform.
Installation
Credentials
Compatibility
Resources
Follow the installation guide in the n8n community nodes documentation. The name of the package is n8n-better-google-services-credential
Refer to the Google Service Account documentation to set up the credentials for use in HTTP nodes.
Whenever you want to impersonate a different user, you can set the delegated-email header in the HTTP node.
Tested with n8n v1.26.0
FAQs
This package provides better Google Services credentials for n8n, by allowing to customize the delegation from the HTTP node directly.
We found that n8n-nodes-google-service-account-dynamic-impersonate demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
/Security News
Compromised intercom-client@7.0.4 npm package is tied to the ongoing Mini Shai-Hulud worm attack targeting developer and CI/CD secrets.

Research
Socket detected a malicious supply chain attack on PyPI package lightning versions 2.6.2 and 2.6.3, which execute credential-stealing malware on import.

Research
A brand-squatted TanStack npm package used postinstall scripts to steal .env files and exfiltrate developer secrets to an attacker-controlled endpoint.