
Security News
Nx npm Packages Compromised in Supply Chain Attack Leveraging AI CLI Tools
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
react-npm-encrypt-decrypt
Advanced tools
The package used to encrypt and decrypt the data dynamically with keys.
This module provides functions for encrypting and decrypting JSON data using the CryptoJS library.
npm i react-npm-encrypt-decrypt
const { decryptJSONHandler, encryptJSONHandler } = require('react-npm-encrypt-decrypt');
// Your encryption key and initialization vector (IV)
const AES_ENC_SECRET_KEY = 'your-secret-key';
const AES_ENC_IV = 'your-initialization-vector';
// Your JSON data to be encrypted
const jsonData = { key1: 'value1', key2: 'value2' };
// Encrypt JSON data
const encryptedData = encryptJSONHandler(JSON.stringify(jsonData), AES_ENC_SECRET_KEY, AES_ENC_IV);
console.log('Encrypted Data:', encryptedData);
// Decrypt JSON data
const decryptedData = decryptJSONHandler(encryptedData, AES_ENC_SECRET_KEY, AES_ENC_IV);
console.log('Decrypted Data:', decryptedData);
FAQs
The package used to encrypt and decrypt the data dynamically with keys.
The npm package react-npm-encrypt-decrypt receives a total of 35 weekly downloads. As such, react-npm-encrypt-decrypt popularity was classified as not popular.
We found that react-npm-encrypt-decrypt demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.