Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Scullog, having capability of sharing the local drive to the browser. Stream the log file via Socket.IO over browser. It run on any platform such as windows/linux/mac. It run as service or standalone mode. It also provide various other features:
Install the scullog npm package
npm install -g scullog
Run the scullog in either standalone
scullog -p 8080 -d /path/to/
or in service mode
scullog -s install -p 8080 -d /path/to/
Then, we can view http://localhost:8080/ in our browser.
scullog [-s ] [-p ] [-d ] [-c ]
Options:
-s, --service install/uninstall as service [choices: "install", "uninstall", "start", "stop", "restart"]
-p, --port Server Port [number]
-d, --directory Root Files Directory [array]
-c, --config Local/Remote Config file [string]
-h, --help Show help
-v, --version Show version number
Scullog Docker Image having alpine linux as a base Image, can be used for running anything, with extra capability of serving & streaming the docker files & logs, over the local system, using 8080 port.
Dependent on Unix style tail command
FAQs
Scullog based on Node.js and Angular.js
The npm package scullog receives a total of 4 weekly downloads. As such, scullog popularity was classified as not popular.
We found that scullog demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.