
Research
Using Trusted Protocols Against You: Gmail as a C2 Mechanism
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.
object-to-schema
Advanced tools
Convert JS Object to leaf api schema
$ npm i object-to-schema -S
const ots = require('object-to-schema');
const obj = {
id: 100,
owner: {
show: true,
login: 'japsu',
},
name: 'Tom',
books: [
{
name: 'Hackers and Painters',
author: 'Paul Graham',
},
],
};
const jsonSchema = ots.json(obj);
const apiSchema = ots.api(obj);
console.log(JSON.stringify(jsonSchema, null, 2));
FAQs
> Convert JS Object to leaf api schema
The npm package object-to-schema receives a total of 4 weekly downloads. As such, object-to-schema popularity was classified as not popular.
We found that object-to-schema demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.
Product
We redesigned Socket's first logged-in page to display rich and insightful visualizations about your repositories protected against supply chain threats.
Product
Automatically fix and test dependency updates with socket fix—a new CLI tool that turns CVE alerts into safe, automated upgrades.