Security News
Opengrep Emerges as Open Source Alternative Amid Semgrep Licensing Controversy
Opengrep forks Semgrep to preserve open source SAST in response to controversial licensing changes.
nanowarpwallet
Advanced tools
Open Source JavaScript Client-Side Nano Wallet Generator Using scrypt
A Nano brain wallet generator that uses scrypt.
For basic use, navigate to https://termhn.github.io/nanowarpwallet, which is the compiled, hosted version of the latest stable version in this GitHub repo. Deterministic (verifiable) builds are implemented, and it is automatically deployed and hosted on GitHub pages, so you can be sure that the code here is really the same code that is compiled and used on the web version. In order to do verify this yourself, see the How to Verify section below.
Add to your dependencies with the usual
yarn add nanowarpwallet
Then use like so:
const warp = require('nanowarpwallet');
const params = {
passphrase : 'testpassword',
salt : 'testsalt',
progress_hook : progress_output => {/*do something*/}
};
function callback(res) {
const address = res.address;
const privateKey = res.privateKey;
const seed = res.seed;
console.log("Wallet Seed: " + seed + " First Address: " + address + " First Private Key: " + privateKey);
}
warp(params, callback);
In order to build NanoWarpWallet yourself, you'll first need to install git and yarn.
Now, type the following into the window that opens, pressing enter or return after each line
git clone https://github.com/termhn/nanowarpwallet
cd nanowarpwallet
This downloads the latest version of the source code from this repository onto your system and then puts you in that folder. Next we will install all the dependencies using yarn. Type:
yarn install
This has installed all the dependencies necessary to build the final page. Now we need to delete the prebuilt version. Navigate to the dist
folder and delete warp_latest.html
and warp_1.0.0_SHA256_{numbers here}.html
files and delete them. We can then build it using
yarn build
Now, the latest version should be installed at dist/warp_1.0.0_SHA256_{numbers here}.html
. You can also access it by clicking on the symbolic link dist/warp_latest.html
. To find this in Windows Explorer, navigate to C:\Users\<Username>\nanowarpwallet\dist
directory.
Coming soon, you can probably adapt the Windows instructions if you know what you're doing. If you want to do this and you aren't sure how, send me a message or issue and I'll walk you through the process.
Coming soon, you can probably adapt the Windows instructions if you know what you're doing. If you want to do this and you aren't sure how, send me a message or issue and I'll walk you through the process.
In order to verify that the version available online is the same as what is generated directly by the source code in this repository, you can follow these steps:
nanowarpwallet/dist/warp_1.0.0_SHA256_{numbers}.html
file you built yourself earlier and repeat the same process of rightclick -> view source -> ctrl+A ctrl+C then paste it into the other side of the diff toolNanoWarpWallet uses yarn to manage its dependencies. Run
$ yarn install
to install the needed dependencies.
$ yarn build
to build once, or
$ yarn start
to watch for changes and re-build during development.
FAQs
Open Source JavaScript Client-Side Nano Wallet Generator Using scrypt
We found that nanowarpwallet demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Opengrep forks Semgrep to preserve open source SAST in response to controversial licensing changes.
Security News
Critics call the Node.js EOL CVE a misuse of the system, sparking debate over CVE standards and the growing noise in vulnerability databases.
Security News
cURL and Go security teams are publicly rejecting CVSS as flawed for assessing vulnerabilities and are calling for more accurate, context-aware approaches.