Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
typhoon-common-store
Advanced tools
Contains the Redux store related functions for the Typhoon system.
Contains the Redux store related functions for the Typhoon system.
Handles the logging in, registration, logging off, and updating of the user account information.
Handles the buffering of data bindings, in order to send over multiple data bindings at once.
Handles the fetching and updating of data from the backend using data bindings. A data binding can be a database query to run, an API to call, or another form of data retrieval and update.
Handles the storage of user input for the screen currently in use.
Handles the storage of information to be used across multiple user sessions.
Handles the retrieval of the menu information for the user from the backend.
Handles the sending of messages from the system to the user.
Handles the setting of parameters for use between data bindings. This allows one data binding's results to trigger the running of another.
Handles the resizing of the browser window.
Handles the retrieving of screen layout information from the backend, along with archiving and retrieval of screens.
Saves status information about the screen currently being displayed.
Handles the retrieving and storing of styling information from the backend.
Handles the setting and running of timers on the system. When a timer elapses, an alarm sound is played.
Holds the login and profile information on the user currently logged into the system. This includes the user's access token, which is used for all interactions with the backend.
Buffers up data bindings so they can be run in batches. This is separate from the data result reducer in order to avoid components updating every time something is pushed to the buffer.
Holds the results of queries against the backend. This can be the results of a database query, or information requested from other systems through the backend.
Holds the information the user inputs into the current screen, for example the text they type in an input box.
Holds information across sessions, when necessary. For example, a user might be working on a project long term and not want to open it again each time they open the system.
Holds the menu for the user, displayed on the left of the screen.
Holds messages sent from components to be displayed to the user.
Holds parameter information used in data bindings against the backend. By updating this reducer, dependent data bindings can be triggered automatically.
Logs the current user off the system, deleting all of their account information and ending their session.
Holds the screen layout information. Once a screen's layout has been retrieved from the backend, it's stored in an archive, so it can be closed and reopened without querying the backend.
Some screens available for viewing anonymously. To do this, a quick link gives a direct URL that users can access to view the screen.
Holds screen status information not input by the user. For example, whether a modal is visible or not.",
The selection is a specialised part of the status reducer that holds the currently selected object. For example, if the screen loads an array of objects and the user selects one for editing, that selected object would be held in the selection part of the reducer.
Holds the styling information for the system. For example, font colours, border widths, etc.
Holds timers and rings an alarm when a timer elapses.
FAQs
Contains the Redux store related functions for the Typhoon system.
We found that typhoon-common-store demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.