
Research
5 Malicious Chrome Extensions Enable Session Hijacking in Enterprise HR and ERP Systems
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.
repo-report
Advanced tools
CLI to list all repos a user has access to, and report on their configuration in aggregate.
CLI to list all repos a user has access to, and report on their configuration in aggregate.
npm install to install all dependencies.env file and initialize GH_TOKEN or GITHUB_TOKEN (in order of precedence) with your Github tokenrepo scope.export GH_TOKEN=<your_personal_access_token>OR you can add it to a .env file in the project root:
GH_TOKEN=your_personal_access_tokenexport GH_TOKEN=<the personal access token generated>npx repo-report./bin/run to get a report of all your repositories in the terminalnpx repo-report --help--help--unactionable--actual--goodness-m, --metrics--all-p, --pick-f, --focus--names-s, --sortname or created instead.-desc--cache--cacheDir.npx repo-report --all --actualalias repo-report='npx repo-report --all --actualsource ~/.bashrcThe following shows an example output of repo-report --all --actual for my repositories. It shows important repository settings like issues, projects, branch protection, and allowed merge strategies. Additional details such as auto-merge, branch deletion on merge, and license information are also included in the full output as seen by the extended table below.

FAQs
CLI to list all repos a user has access to, and report on their configuration in aggregate.
We found that repo-report demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.

Research
Node.js patched a crash bug where AsyncLocalStorage could cause stack overflows to bypass error handlers and terminate production servers.

Research
/Security News
A malicious Chrome extension steals newly created MEXC API keys, exfiltrates them to Telegram, and enables full account takeover with trading and withdrawal rights.