
Security News
/Research
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Realtime robot data visualization in the browser
You’ll need to have Node 8.16.0 or Node 10.16.0 or later version on your local development machine (but it’s not required on the server). You can use nvm (macOS/Linux) or nvm-windows to easily switch Node versions between different projects.
To start the user interface locally in dev mode, run the following commands:
npm install
npm start
The production version can be run locally with either docker or by building from source.
Running the docker container:
docker build -t=zethus .
docker run -p 8080:8080 zethus
Building the source:
npm install
npm run build
Then start a server in build
directory. You can use serve npm package or any similar software
Available options for each visualization are on the Github Wiki page
PRs, bug reports, and feature requests are welcome! Please observe CONTRIBUTING.md and CODE_OF_CONDUCT.md when making a contribution.
Active: Rapyuta Robotics is actively working on this project, and we expect to continue for work for the foreseeable future.
FAQs
Realtime robot data visualization in the browser
The npm package zethus receives a total of 1 weekly downloads. As such, zethus popularity was classified as not popular.
We found that zethus demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.