
Research
NPM targeted by malware campaign mimicking familiar library names
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
blazor.tools.blazorbundler
Advanced tools
BlazorBundler is a utility tool designed to simplify the process of bundling multiple packages, particularly for Blazor applications. This tool allows you to download and bundle essential files and dependencies, such as Bootstrap and Bootstrap Icons, to enhance your Blazor projects.
You can install BlazorBundler via NuGet Package Manager, Package Manager Console or from a terminal:
Install-Package Blazor.Tools.BlazorBundler
dotnet add package Blazor.Tools.BlazorBundler
Note: After installing the package, you have to manually run the Install-Pkgs module file to install required nuget packages. First replace the values of the $userProfileName and $targetPath variables.
$userProfileName should contain your Windows UserProfile Name
$sourcePath should not be changed
$targetPath should contain the full path of your project file
$version = "$packageVersion"
$userProfileName = "solom"
$sourcePath = "C:\Users\$userProfileName\.nuget\packages\blazor.tools.blazorbundler\$version"
$targetPath = "C:\repo\Blazor.Tools\Blazor.Tools\Blazor.Tools.csproj"
Install-Pkgs -SourcePath $sourcePath -TargetProjectPath $targetPath
Add these to your section:
<link rel="stylesheet" href="bootstrap/bootstrap.min.css" />
<link rel="stylesheet" href="bundler/bootstrap-icons/font/bootstrap-icons.min.css" />
<link rel="stylesheet" href="bundler/blazor-bootstrap/blazor.bootstrap.css" />
<link rel="stylesheet" href="bundler/css/bundler.css" />
<!-- This is the <ASSEMBLY_NAME>.styles.css file-->
<link rel="stylesheet" href="Blazor.Tools.styles.css" />
<script src="bundler/blazored-typeahead/blazored-typeahead.js"></script>
<script src="bundler/js/site.js"></script>
<!-- It needs to be in InteractiveServer mode to work -->
<HeadOutlet @rendermode="@InteractiveServer" />
Add these to your section:
<!-- Once again, this is needed -->
<Routes @rendermode="@InteractiveServer" />
<!-- The script initializes the Blazor runtime, which is essential for a Blazor application to run -->
<script src="_framework/blazor.web.js"></script>
<!-- Use local Bootstrap JS -->
<script src="bundler/js/bootstrap.bundle.min.js"></script>
<script src="bundler/blazor-bootstrap/blazor.bootstrap.js"></script>
builder.Services.AddBlazorBootstrap();
First, uninstall the package from the Nuget Package Manager, Package Manager Console or from a terminal.
Uninstall-Package Blazor.Tools.BlazorBundler
dotnet remove package Blazor.Tools.BlazorBundler
Note: After uninstalling the package, you have to manually run the Uninstall module file to uninstall the packages. First replace the values of the $userProfileName and $targetPath variables.
$projectPath should contain the path to your project folder
$projectName should contain the name of your project
Open PowerShell and run:
$projectPath = "C:\repo\Blazor.Tools\Blazor.Tools\"
$projectName = "Blazor.Tools.csproj"
Uninstall-Pkgs -ProjectPath $projectPath -ProjectName $projectName
FAQs
Unknown package
We found that blazor.tools.blazorbundler demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
Research
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.