Security News
Node.js EOL Versions CVE Dubbed the "Worst CVE of the Year" by Security Experts
Critics call the Node.js EOL CVE a misuse of the system, sparking debate over CVE standards and the growing noise in vulnerability databases.
npm install -g nodekey
Run nodekey --help
to get usage instructions regarding program arguments.
Run nodekey
without arguments to define a master key and enter interactive mode. Use the interactive command help
to show the available commands.
Main Features:
On first startup you are asked for an encryption password for the profile data (e.g. application schemas, meta data,
...). This password will also be used as default master key for key generation and encryption. You will be asked for
this password on every startup with the same profile path ($HOME/.config/NodeKEY/
by default).
If needed, the su
command can be used for a different master key for key generation and encryption.
You may adjust any settings within the newly created settings file (<profile-path>/settings.json
by default). However
the default settings should suffice in general.
Use the mkapp
command (see help mkapp
for details) to create your applications (use -S
option for directories that
won't directly contain generated keys). Now you can create keys for those applications with the key
command (see
help key
for details).
With the cat
and fetch
commands the key contents can be displayed or put into the system clipboard respectively.
NodeKEY uses scrypt
for primary hashing. This provides high computational and memory difficulties for possible
attacks. In addition -- if supported by the system -- SHA512
or SHA256
(fallback) is used, just in case scrypt
has
any design flaw.
Stored keys use the same hashing methods as generated keys, to generate a passphrase that is then used for the encryption algorithm. NodeKEY already considers it impossible for an attacker to reconstruct the master key from a hash. In conclusion it ought to be impossible to reconstruct the master key from a stored key as well.
For encryption, NodeKEY uses aes-256-cbc
and bf-cbc
as available on the system.
As the entropy of a generated key is as high as it gets (NodeKEY might have slight entropy losses, but nothing critical) with the defined schema, generated keys are still preferred over custom stored ones. Keep in mind that you probably never need to type in the password by hand.
Using the clipboard is one weakness of password managers. An infected system may spy the clipboard and thus get access to the application keys. However since such malware probably would also spy on typed keys, this weakness is no more critical than typing passwords by hand.
Make sure to log out (Ctrl+D
/exit
) whenever you leave your computer unwatched. Nobody would be able to get access to
the master key, but the application keys are vulnerable to simple computer access while logged in.
FAQs
CLI Password manager for stored and generated passwords.
The npm package nodekey receives a total of 0 weekly downloads. As such, nodekey popularity was classified as not popular.
We found that nodekey demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Critics call the Node.js EOL CVE a misuse of the system, sparking debate over CVE standards and the growing noise in vulnerability databases.
Security News
cURL and Go security teams are publicly rejecting CVSS as flawed for assessing vulnerabilities and are calling for more accurate, context-aware approaches.
Security News
Bun 1.2 enhances its JavaScript runtime with 90% Node.js compatibility, built-in S3 and Postgres support, HTML Imports, and faster, cloud-first performance.