
Research
Security News
The Landscape of Malicious Open Source Packages: 2025 Mid‑Year Threat Report
A look at the top trends in how threat actors are weaponizing open source packages to deliver malware and persist across the software supply chain.
node-hashring
Advanced tools
A consistent hashing ring with replicas for more even distribution (virtual nodes) and binary searching for best performance.
This hashring uses the MurmurHash algorithm which creates a 32-bit integer as opposed to using something like a 128-bit MD5. Which means, in comparison to an MD5 based hashring, this offers a lot more performance.
npm install node-hashing
// or
yarn add node-hashring
This will create a hashring for two primary nodes, by default each node will be comprised of 80 virtual nodes.
const HashRing = require('node-hashring');
const hashRing = new HashRing([
'server-address-1',
'server-address-2',
]);
const serverAddress = hashRing.findNode('my-key');
hashRing.addNode('server-address-2');
hashRing.removeNode('server-address-2');
FAQs
A consistent hashing ring with binary search
We found that node-hashring demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A look at the top trends in how threat actors are weaponizing open source packages to deliver malware and persist across the software supply chain.
Security News
ESLint now supports HTML linting with 48 new rules, expanding its language plugin system to cover more of the modern web development stack.
Security News
CISA is discontinuing official RSS support for KEV and cybersecurity alerts, shifting updates to email and social media, disrupting automation workflows.