
Research
SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains
An emerging npm supply chain attack that infects repos, steals CI secrets, and targets developer AI toolchains for further compromise.
Like that Lada Gaga song except it is p2p chat over udp. I mainly implemented this to showcase udp hole punching
npm install -g telephone
On two machines connected to the internet using a somewhat sane router configuration run
telephone --hole-puncher dev.mathiasbuus:23232 --channel my-channel
The above example uses the hole puncher running on my test digital ocean machine. This machine is only used for the initial handshake. All other traffic is running completely p2p.
To run your own hole puncher run
telephone-hole-puncher
For more options run
telephone --help
telephone-hole-puncher --help
MIT
FAQs
Like that Lada Gaga song except it is p2p chat over udp.
We found that telephone demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
An emerging npm supply chain attack that infects repos, steals CI secrets, and targets developer AI toolchains for further compromise.

Company News
Socket is proud to join the OpenJS Foundation as a Silver Member, deepening our commitment to the long-term health and security of the JavaScript ecosystem.

Security News
npm now links to Socket's security analysis on every package page. Here's what you'll find when you click through.