{"id":10357,"date":"2018-08-22T21:44:41","date_gmt":"2018-08-22T21:44:41","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/"},"modified":"2018-08-22T21:44:41","modified_gmt":"2018-08-22T21:44:41","slug":"one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/","title":{"rendered":"One-in-two JavaScript project audits by NPM tools sniff out at least one vulnerability&#8230;"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/08\/22\/shutterstock_227275423.jpg?x=1200&amp;y=794\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>JavaScript library custodian NPM, after years of security scrambling, looks to be getting a grip on its code safety.<\/p>\n<p>There was <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/05\/04\/cookie_compromise_caper_caught_and_crumbled\/\">that incident in May<\/a> when NPM swiftly removed a backdoored package following complaints. No real damage was done.<\/p>\n<p>A month earlier, the bit-shifting biz added a &#8220;audit&#8221; command to v6 of <code>npm<\/code>, the company&#8217;s eponymous command line tool. Thereafter, <code>npm<\/code>-wielding developers had the option to type <code>npm audit<\/code> from the command line while in a Node.js project directory, generating a listing of known vulnerabilities affecting package dependencies hailing from code stored in the NPM registry.<\/p>\n<p>Better still, simply typing <code>npm install<\/code> \u2013 the command to populate a Node.js project with packages declared in the <code>package.json<\/code> file \u2013 would run an automatic security audit.<\/p>\n<p>Remediation is not automatic, but <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/blog.npmjs.org\/post\/174001864165\/v610-next0\">as of May<\/a>, users gained the ability to type <code>npm audit fix<\/code> to replace outdated, insecure modules in projects with current, hopefully secure ones.<\/p>\n<p>Since April, according to the company, <code>npm<\/code> users have run 50 million automatic scans and have deliberately invoked the command 3.1 million times. And they&#8217;re running 3.4 million security audits a week.<\/p>\n<p>Across all audits, 51 per cent found at least one vulnerability and 11 per cent identified a critical vulnerability.<\/p>\n<h3 class=\"crosshead\"><span>Pull the other one<\/span><\/h3>\n<p>In a phone interview with <em>The Register<\/em>, Adam Baldwin, head of security at NPM, said he didn&#8217;t have data on how many people are choosing to fix flagged flaws. &#8220;But what we&#8217;ve seen from pull requests suggests it&#8217;s gaining traction,&#8221; he said.<\/p>\n<p>Incidentally, npm&#8217;s thinking about security is finding similar expression elsewhere in the industry. Earlier this year, GitHub <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/03\/23\/github_dependency_scanner\/\">began alerting developers<\/a> when their code contains insecure libraries.<\/p>\n<p>During a <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/08\/16\/github_rails_microsoft\/\">recent media briefing<\/a>, GitHub&#8217;s head of platform Sam Lambert said he hoped that the process could be made more automated through the mechanized submission of git pull requests that developers could simply accept to replace flawed code.<\/p>\n<p>Baldwin said NPM might implement something similar, an intervention rather than a simple notification. &#8220;Currently it&#8217;s not proactive policy enforcement,&#8221; he said. &#8220;But it&#8217;s something we&#8217;re considering.&#8221;<\/p>\n<p>That would appeal to NPM&#8217;s growing enterprise constituency. &#8220;Enterprises for sure want the compliance and control,&#8221; said Baldwin. &#8220;They want that ability to know the open source they&#8217;re bringing in is safe or meets a certain set of criteria.&#8221;<\/p>\n<p>Upping its security game further still, NPM on Wednesday added <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/blog.npmjs.org\/post\/177279385225\/three-new-features-to-help-our-users-protect\">\u201cReport a Vulnerability\u201d buttons<\/a> to every NPM package webpage. The biz also started checking the hashes of passwords during account creation against the &#8220;Have I Been Pwned?&#8221; database, to help users avoid compromised passwords.<\/p>\n<p>This isn&#8217;t to say there won&#8217;t be further security issues with NPM packages, but the tools for avoiding problems and fixing them are getting better. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1787\/-6625\/following-bottomlines-journey-to-the-hybrid-cloud?td=wptl1787\">Following Bottomline\u2019s journey to the Hybrid Cloud<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/08\/22\/npm_vulnerability_scanner\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8230;and those devs are then applying patches, we hope JavaScript library custodian NPM, after years of security scrambling, looks to be getting a grip on its code safety.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":10358,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-10357","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>One-in-two JavaScript project audits by NPM tools sniff out at least one vulnerability... 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"One-in-two JavaScript project audits by NPM tools sniff out at least one vulnerability... 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-22T21:44:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"794\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"One-in-two JavaScript project audits by NPM tools sniff out at least one vulnerability&#8230;\",\"datePublished\":\"2018-08-22T21:44:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\\\/\"},\"wordCount\":474,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\\\/\",\"name\":\"One-in-two JavaScript project audits by NPM tools sniff out at least one vulnerability... 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability.jpg\",\"datePublished\":\"2018-08-22T21:44:41+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability.jpg\",\"width\":1200,\"height\":794},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"One-in-two JavaScript project audits by NPM tools sniff out at least one vulnerability&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"One-in-two JavaScript project audits by NPM tools sniff out at least one vulnerability... 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"One-in-two JavaScript project audits by NPM tools sniff out at least one vulnerability... 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-22T21:44:41+00:00","og_image":[{"width":1200,"height":794,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"One-in-two JavaScript project audits by NPM tools sniff out at least one vulnerability&#8230;","datePublished":"2018-08-22T21:44:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/"},"wordCount":474,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/","url":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/","name":"One-in-two JavaScript project audits by NPM tools sniff out at least one vulnerability... 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability.jpg","datePublished":"2018-08-22T21:44:41+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability.jpg","width":1200,"height":794},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/one-in-two-javascript-project-audits-by-npm-tools-sniff-out-at-least-one-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"One-in-two JavaScript project audits by NPM tools sniff out at least one vulnerability&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=10357"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10357\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/10358"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=10357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=10357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=10357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}