
Research
/Security News
Weaponizing Discord for Command and Control Across npm, PyPI, and RubyGems.org
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
serve-public
Advanced tools
Serve any folder on your device with a Public URL
Install serve-public
with NPM.
Run npm install -g serve-public
Get a Public URL for any folder on your device with:
serve-public --path </path/to/your/folder>
You'll see output like
Local server listening on http://localhost:3000 # This is the port the server is listening to on localhost
http://cnrsqd-ip-157-211-241-249.tunnelmole.com is forwarding to localhost:3000 # A public, plain HTTP url for your folder
https://cnrsqd-ip-157-211-241-249.tunnelmole.com is forwarding to localhost:3000 # A public HTTPS url for your folder
serve-public
uses Tunnelmole under the hood to get the Public URLs. It then starts a simple Express server with a couple of middlewares.
When you hit the public URL, the request is forwarded through the tunnelmole servers to your local client, then to the express server serving up your folder.
FAQs
Serve any folder with a Public URL
We found that serve-public demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
Security News
Socket now integrates with Bun 1.3’s Security Scanner API to block risky packages at install time and enforce your organization’s policies in local dev and CI.
Research
The Socket Threat Research Team is tracking weekly intrusions into the npm registry that follow a repeatable adversarial playbook used by North Korean state-sponsored actors.