
Research
Security News
Malicious npm Packages Use Telegram to Exfiltrate BullX Credentials
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
pomelo-loader
Advanced tools
#pomelo-loader - loader module for pomelo
Load codes for pomelo based on the convention over configuration rules.
pomelo-rpc could load modules in batch but not load the sub-directory recursively.
##Regulation Module name
Module would use the filename by default. For example: load lib/a.js
and the return result would be: {a: require('./lib/a')}
It would use the name if the module with a name property. For example
a.js
exports.name = 'test';
the return result would be: {test: require('./lib/a')}
Module definiation
If the module exported as a function, pomelo-loader would take it as a factory method and generate a new instance of module by calling the function. And it would return the module directly for other situation.
module.exports = function(context) {
return {}; // return some module instance
};
##Installation
npm install pomelo-loader
##Usage
var Loader = require('pomelo-loader');
var res = Loader.load('.');
console.log('res: %j', res);
##API ###Loader.load(path, context) Load all modules in the path. ####Parameters
FAQs
Load codes for pomelo based on the convention over configuration rules.
We found that pomelo-loader demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.
Security News
AI-generated slop reports are making bug bounty triage harder, wasting maintainer time, and straining trust in vulnerability disclosure programs.