Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
nft-blind-box-protocol
Advanced tools
- [SDK package](./sdk/) - [Sample Scripts](#sample-scripts) - [RiverBox Dev](#riverbox-dev) - [Admin SOP](#admin-sop) - [Latest Contract Address](./logs-persis/deployment.json)
yarn
yarn run hardhat compile
yarn run hardhat docgen
yarn run lint
yarn run lint:fix
yarn run format
yarn run format:fix
yarn run hardhat typechain
yarn run hardhat node --network hardhat --no-deploy --show-accounts
# or use arbitrary env file
yarn run env-cmd -f envs/.env.exampleA yarn run hardhat node --network hardhat --no-deploy --show-accounts
yarn run hardhat test --network localhost
# or use arbitrary env file e.g.
yarn run env-cmd -f envs/.env.exampleA yarn run hardhat test --network localhost
yarn run hardhat run scripts/sample-script.ts --network localhost
# or use arbitrary env file e.g.
yarn run env-cmd -f envs/.env.exampleA yarn run hardhat run scripts/sample-script.ts --network localhost
yarn run hardhat deploy --network localhost
# or use arbitrary env file e.g.
yarn run env-cmd -f envs/.env.exampleA yarn run hardhat deploy --network localhost --reset
FUSION_TABLE=./config/assets/6.17-fusion-table.csv yarn run hardhat test --network hardhat test/upgradeable/*.ts
yarn run hardhat coverage --testfiles test/upgradeable --network hardhat
Deploy
deploy proxy contracts (start a local hardhat
network first ref)
LOAD_TASK=True yarn run hardhat riverbox:upgradeable:init:deploy --network localhost | tee -a ./logs/deployToLocal.log
setHierarchy(Use existing deployment information)
LOAD_TASK=True yarn run hardhat riverbox:setHierarchy --input ./config/assets/6.19-fusion-table.csv --batch-size 50 --stock-sub-sample 10 --network localhost | tee -a ./logs/setHierarchyLocal.log
setHierarchy(Override address or implementation name)
export RIVERBOX_ADDRESS={}
export RIVERBOX_IMPL={}
LOAD_TASK=True yarn run hardhat riverbox:setHierarchy --input ./config/assets/6.19-fusion-table.csv --batch-size 50 --river-box-address $RIVERBOX_ADDRESS --river-box-impl $RIVERBOX_IMPL --stock-sub-sample 10 --network localhost | tee -a ./logs/setHierarchyLocal.log
Upgrade RiverBox Implementation. (Replace --new-impl-name with the name of new implementation contract name)
LOAD_TASK=True yarn run hardhat riverbox:proxy:upgradeImpl --new-impl-name RiverBoxImpl --network localhost | tee -a ./logs/upgradeRiverBoxLocal.log
Upgrade RiverBoxEx Implementation. (Replace --new-impl-name with the name of new implementation contract name)
LOAD_TASK=True yarn run hardhat riverboxEx:proxy:upgradeImpl --new-impl-name RiverBoxExchangeImpl --network localhost | tee -a ./logs/upgradeRiverBoxExLocal.log
Deploy deploy proxy contracts
LOAD_TASK=True yarn run env-cmd -f ./envs/.env.eth.bsc-test yarn run hardhat riverbox:upgradeable:init:deploy --network bscTest | tee -a ./logs/deployToBscTest.log
setHierarchy(Use existing deployment information)
LOAD_TASK=True yarn run env-cmd -f ./envs/.env.eth.bsc-test yarn run hardhat riverbox:setHierarchy --input ./config/assets/6.19-fusion-table.csv --batch-size 50 --stock-sub-sample 10 --network bscTest | tee -a ./logs/setHierarchyBscTest.log
setHierarchy(Override address or implementation name)
export RIVERBOX_ADDRESS={}
export RIVERBOX_IMPL={}
LOAD_TASK=True yarn run env-cmd -f ./envs/.env.eth.bsc-test yarn run hardhat riverbox:setHierarchy --input ./config/assets/6.1-fusion-table.csv --batch-size 50 --river-box-address $RIVERBOX_ADDRESS --river-box-impl $RIVERBOX_IMPL --network bscTest | tee -a ./logs/setHierarchyBscTest.log
Upgrade RiverBox Implementation. (Replace --new-impl-name with the name of new implementation contract name)
LOAD_TASK=True yarn run env-cmd -f ./envs/.env.eth.bsc-test yarn run hardhat riverbox:proxy:upgradeImpl --new-impl-name RiverBoxImpl --network bscTest | tee -a ./logs/upgradeRiverBoxBscTest.log
Upgrade RiverBoxEx Implementation. (Replace --new-impl-name with the name of new implementation contract name)
LOAD_TASK=True yarn run env-cmd -f ./envs/.env.eth.bsc-test yarn run hardhat riverboxEx:proxy:upgradeImpl --new-impl-name RiverBoxExchangeImpl --network bscTest | tee -a ./logs/upgradeRiverBoxExBscTest.log
Generic Interact
# check supply
LOAD_TASK=True yarn run env-cmd -f ./envs/.env.eth.bsc-test yarn run hardhat riverbox:interact --function-name totalSupply --args \[\] --network bscTest
# withdraw
LOAD_TASK=True yarn run env-cmd -f ./envs/.env.eth.bsc-test yarn run hardhat riverbox:interact --function-name withdraw --args \[\"0xEd558c75937611cD07dEC3dB75B557462bbe8EF7\",\"1150000000000000000\"\] --network bscTest
# check paused
LOAD_TASK=True yarn run env-cmd -f ./envs/.env.eth.bsc-test yarn run hardhat riverbox:interact --function-name paused --args \[\] --network bscTest
FAQs
- [SDK package](./sdk/) - [Sample Scripts](#sample-scripts) - [RiverBox Dev](#riverbox-dev) - [Admin SOP](#admin-sop) - [Latest Contract Address](./logs-persis/deployment.json)
The npm package nft-blind-box-protocol receives a total of 0 weekly downloads. As such, nft-blind-box-protocol popularity was classified as not popular.
We found that nft-blind-box-protocol demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.