Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
node-red-contrib-tezos-utils
Advanced tools
This project brings an easy to use graphical interface to interact with Dexter smart contracts.
It could be useful as a starting point to build arbitrage bots, multiple steps workflows that interact with Tezos blockchain, etc.
Installed NodeJS (tested with NodeJS v14+)
Installed NPM
npm install -g --unsafe-perm node-red
check other options (it can run in a docker container for example), here
Go to the node-red data directory e.g: ~/.node-red and run:
cd ~/.node-red
npm install --save node-red-contrib-tezos-utils
Then restart node-red.
Youtube video - Comming soon.
Some components requires a Tezos wallet in order to sign transaction on the blockchain, the secret key is saved encripted with a default private key in node-red storage, please be aware that this setup can compromise your funds, security measures must be taken in consideration.
FOR EDUCATION PURPOSES ONLY, USE AT YOUR OWN RISK
FAQs
Nodered nodes to interact with Tezos
The npm package node-red-contrib-tezos-utils receives a total of 3 weekly downloads. As such, node-red-contrib-tezos-utils popularity was classified as not popular.
We found that node-red-contrib-tezos-utils demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.