
Research
Two Malicious Rust Crates Impersonate Popular Logger to Steal Wallet Keys
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
protobuf-decode
Advanced tools
Javascript version protobuf decoder. Aim: light-weight, file size no larger than 5kB. Just decode simple structs.
We don't use .proto file, instead, we use a JSON formatted message description, basically the same as protobuf.js json format.
To decode a protobuf, first you need to use build()
method to build the message package,
this step will automatically detect embedded message dependencies and handle them for furthur use.
Then, you can pick your message from the result of first step to actually decode a byte array. This process shoud be like:
import protobuf from './protobuf';
import msgPackage from './msg_struct';
// build the messages package
const builders = protobuf.build(msgPackage),
builder = builders.HistoryData;
// decode using message builder
protobuf.decode(byteArr, builder)
It's written in es6 style code, so you need to npm install babel-node. To test, you can run:
babel-node --presets es2015 test.js
FAQs
extremely light-weight protobuf decode module, no larger than 5kB
We found that protobuf-decode demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.