
Security News
Node.js Drops Bug Bounty Rewards After Funding Dries Up
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.
sha1sum-cli
Advanced tools
Cross Platform CLI File SHA-1 Hash Generator
Install Globally:
$ npm install -g sha1sum-cli
Usage:
$ sha1sum \[path/\]filename
Display help:
$ sha1sum -h
$ sha1sum --help
So, this is a command line npm package that simulates the sha1sum command on linux.
Since I am, unfortunately, developing on Windows to run on linux I cannot use the same checksum hash utility.
I have reasonable suspicion that node will be wherever I need to build. That simple.
While the tool I built is probably inferior to the real deal, it meets my needs and I suppose it is better than the nothing I found before I built it.
Feel free to improve it or build something yourself should it be insufficient.
I've left my work both as free as in speech and free as in beer as I could manage, mind the dependencies licenses as need be.
P.S. The way I actually install it:
$ npm install --save-dev sha1sum-cli
The ways I actually use it:
$ node node_modules/sha1sum/bin/sha1sum.js \[path/\]filename
$ sed -i s/%REPLACEABLE_BUILD_VERSION_HASH%/`node node_modules/sha1sum/bin/sha1sum.js \[path/\]filename`/g
FAQs
Cross Platform CLI File SHA-1 Hash Generator
We found that sha1sum-cli demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.