
Research
/Security News
Intercom’s npm Package Compromised in Ongoing Mini Shai-Hulud Worm Attack
Compromised intercom-client@7.0.4 npm package is tied to the ongoing Mini Shai-Hulud worm attack targeting developer and CI/CD secrets.
bedboss
Advanced tools
Documentation: https://docs.bedbase.org/bedboss
Source Code: https://github.com/databio/bedboss
BEDboss is a command-line management tool for BEDbase. It contains pipelines that filters, standardizes, and calculates statistics for genomic interval data, functions that enters the results into a BEDbase database, deletes bed and bedsets from the database, and indexes the data to qdrant.
To install bedboss use this command:
pip install bedboss
or install the latest version from the GitHub repository:
pip install git+https://github.com/databio/bedboss.git
For development, you should install all the dependencies, create a virtual environment, and work on the local database. The workflow is described in the development documentation.
To test requirements, install bedboss and run:
bedboss requirements-check
Use this docs:
Run this command in the root of the repository:
cd scripts
bash update_usage_docs.sh
FAQs
Pipelines for genomic region file to produce bed files, and its statistics
We found that bedboss demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
/Security News
Compromised intercom-client@7.0.4 npm package is tied to the ongoing Mini Shai-Hulud worm attack targeting developer and CI/CD secrets.

Research
Socket detected a malicious supply chain attack on PyPI package lightning versions 2.6.2 and 2.6.3, which execute credential-stealing malware on import.

Research
A brand-squatted TanStack npm package used postinstall scripts to steal .env files and exfiltrate developer secrets to an attacker-controlled endpoint.