Gathering detailed insights and metrics for dag-jose-utils
Gathering detailed insights and metrics for dag-jose-utils
Gathering detailed insights and metrics for dag-jose-utils
Gathering detailed insights and metrics for dag-jose-utils
npm install dag-jose-utils
Typescript
Module System
Node Version
NPM Version
78.4
Supply Chain
84.4
Quality
82.8
Maintenance
100
Vulnerability
99.3
License
TypeScript (100%)
Total Downloads
943,108
Last Day
461
Last Week
5,357
Last Month
23,259
Last Year
374,771
9 Stars
18 Commits
3 Forks
6 Watching
4 Branches
7 Contributors
Latest Version
4.0.0
Package Id
dag-jose-utils@4.0.0
Unpacked Size
7.05 kB
Size
2.59 kB
File Count
4
NPM Version
9.8.0
Node Version
20.5.1
Publised On
03 Jan 2024
Cumulative downloads
Total Downloads
Last day
-36.2%
461
Compared to previous day
Last week
47.3%
5,357
Compared to previous week
Last month
-7.3%
23,259
Compared to previous month
Last year
35.5%
374,771
Compared to previous year
This library provides utilities for using the DAG-JOSE IPLD codec. It uses DAG-CBOR to encode payloads and cleartexts to CIDs.
First install the package
$ npm i --save dag-jose-utils
1import { 2 encodePayload, 3 prepareCleartext, 4 decodeCleartext, 5 encodeIdentityCID, 6 decodeIdentityCID, 7 toJWSPayload, 8 toJWSStrings 9} from 'dag-jose-utils'
1interface EncodedPayload { 2 cid: CID 3 linkedBlock: Uint8Array 4}
Prepares a payload to be signed in a JWS. Note that you will need to encode the encodePayload.cid.bytes
as base64url
before signing.
Prepares a cleartext object to be encrypted in a JWE. By default the blockSize for padding is 24.
Decode a decrypted cleartext to an ipld object.
Encode an ipld object as a CID that uses the identity hash.
Decode an ipld object from a CID that uses the identity hash.
Transform an EncodedPayload
(from encodePayload()
) or a CID into a JWS string for use with createJWS()
in did-jwt. The string form is simply the Base64url encoded form of the CID's byte representation.
Transform a DagJWS
object from ipld-dag-jose into an array of strings for each signature in the object. The strings can then be verified using verifyJWS()
in did-jwt.
MIT or APACHE
No vulnerabilities found.
Reason
no binaries found in the repo
Reason
no dangerous workflow patterns detected
Reason
license file detected
Details
Reason
3 existing vulnerabilities detected
Details
Reason
Found 5/18 approved changesets -- score normalized to 2
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
project is not fuzzed
Details
Reason
branch protection not enabled on development/release branches
Details
Reason
security policy file not detected
Details
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
Score
Last Scanned on 2024-12-23
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More