
Research
5 Malicious Chrome Extensions Enable Session Hijacking in Enterprise HR and ERP Systems
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.
trace-component
Advanced tools
Client-side tracing for performance analysis in production.
$ component install component/trace
Initialize a new Tracer with the given id
and name. A "cycle" represents N related traces,
these traces may be sequential or concurrent, later
graphed to show you how long the cycle and its components
spent processing.
Trace start of type with optional date.
Trace end of type with optional date.
Return all cycles collected thus far, flushing them for subsequent calls. This method allows you to report the cycles to the server periodicially, you'll likely want to also transmit user-agent data along with this.
var cycle = require('trace');
cycle.flush();
Yields an array similar to the following with your trace data:
[
{
"id": 1,
"cycle": "upload",
"type": "upload",
"start": 1366405821464
},
{
"id": 1,
"cycle": "upload",
"type": "thumb",
"start": 1366405822465
},
{
"id": 1,
"cycle": "upload",
"type": "thumb",
"end": 1366405822766
},
{
"id": 1,
"cycle": "upload",
"type": "upload",
"end": 1366405823268
}
]
MIT
FAQs
Client-side tracing for performance analysis
We found that trace-component demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.

Research
Node.js patched a crash bug where AsyncLocalStorage could cause stack overflows to bypass error handlers and terminate production servers.

Research
/Security News
A malicious Chrome extension steals newly created MEXC API keys, exfiltrates them to Telegram, and enables full account takeover with trading and withdrawal rights.