Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Sopel plugin that detects AMP links and finds their canonical forms using AmputatorBot
Sopel plugin that detects AMP links and finds their canonical forms using AmputatorBot
Releases are hosted on PyPI, so after installing Sopel, all you need is pip
:
$ pip install sopel-amputator
The easiest way to configure sopel-amputator
is via Sopel's
configuration wizard—simply run sopel-plugins configure amputator
and enter the values for which it prompts you.
Individual settings are described below.
ignore_domains
This is a list of hostnames which sopel-amputator
will ignore, even if they
match one of the common AMP substrings it looks for. By default it contains a
set of ignored domains from the AmputatorBot project.
Setting this value overrides the default, so make sure to also enter any entries that you would like to keep from the default list.
Under-the-hood improvements:
setup.py
+setup.cfg
to pyproject.toml
Initial release.
Pending conversion from setup.py
+setup.cfg
template to newer style package
using pyproject.toml
—plus some other features on the todo list—but the basics
are here:
FAQs
Sopel plugin that detects AMP links and finds their canonical forms using AmputatorBot
We found that sopel-amputator demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.