
Research
Malicious NuGet Packages Typosquat Nethereum to Exfiltrate Wallet Keys
The Socket Threat Research Team uncovered malicious NuGet packages typosquatting the popular Nethereum project to steal wallet keys.
substrate-lite
Advanced tools
This JavaScript library provides a light client for the Polkadot blockchain and for chains built using the Substrate blockchain framework.
It is an "actual" light client, in the sense that it is byzantine-resilient. It does not rely on the presence of an RPC server, but directly connects to the full nodes of the network.
import * as substrate_lite from 'substrate-lite';
// Load a string chain specifications.
const chain_spec = Buffer.from(fs.readFileSync('./westend.json')).toString('utf8');
substrate_lite
.start({
chain_spec: chain_spec,
json_rpc_callback: (resp) => {
// Called whenever the client emits a response to a JSON-RPC request,
// or a JSON-RPC pub-sub notification.
console.log(resp)
}
})
.then((client) => {
client.send_json_rpc('{"jsonrpc":"2.0","id":1,"method":"system_name","params":[]}');
})
The start
function returns a Promise
.
FAQs
Light client that connects to Polkadot and Substrate-based blockchains
We found that substrate-lite demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
The Socket Threat Research Team uncovered malicious NuGet packages typosquatting the popular Nethereum project to steal wallet keys.
Product
A single platform for static analysis, secrets detection, container scanning, and CVE checks—built on trusted open source tools, ready to run out of the box.
Product
Socket is launching experimental protection for the Hugging Face ecosystem, scanning for malware and malicious payload injections inside model files to prevent silent AI supply chain attacks.