
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
node-v8-clone
Advanced tools
The most convenient and accurate cloner for node.js. It's also very fast in some cases (benchmarks inside).
It's a c++ addon for node.js that does the most accurate cloning for node.js. It's also very fast in some cases (benchmarks inside).
Tested on node.js versions 0.8, 0.9, 0.10 and 0.11.13 (prior 0.11.x versions are not compatible).
You may be asked to install make
and g++
as well.
npm install node-v8-clone
var clone = require('node-v8-clone').clone;
var a = { x: { y: {} } };
// deep clone
var b = clone(a, true);
a === b // false
a.x === b.x // false
a.x.y === b.x.y // false
// shallow clone
var c = clone(a, false);
a === c // false
a.x === c.x // true
a.x.y === c.x.y // true
Extended syntax:
var Cloner = require('node-v8-clone').Cloner;
var a = [1, [2, 3, 4], 5];
// create a cloner instance for deep cloning optimized for arrays.
var c = new Cloner(true, { 'Array': Cloner.deep_array });
var b = c.clone(a);
a === b // false
a[1] === b[1] // false
For running tests you'll need to install dev dependencies at first (run in node-v8-clone dir):
$ npm install
To run tests for node-v8-clone run:
$ npm test
To run tests for 3rdparty modules run:
$ npm run-script benchmark-prepare
$ npm run-script test-3rdparty
Test results are available here.
Also you may want to check the module's page at Travis CI.
FAQs
The most convenient and accurate cloner for node.js. It's also very fast in some cases (benchmarks inside).
The npm package node-v8-clone receives a total of 30 weekly downloads. As such, node-v8-clone popularity was classified as not popular.
We found that node-v8-clone demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.