Bibliography
[1]“5 Node.js Security Risks You Cannot Ignore – KeenEthics Blog.” https://keenethics.com/blog/nodejs-security (accessed Jan. 16, 2021).
[2]“10 npm Security Best Practices | Snyk,” Feb. 19, 2019. https://snyk.io/blog/ten-npm-security-best-practices/ (accessed Jan. 16, 2021).
[3]“Dependency Injection in nodejs. After spending a fair bit of time in… | by Magnus Tovslid | Medium.” https://medium.com/@magnusjt/dependency-injection-in-nodejs-9601a19c1f36 (accessed Jan. 16, 2021).
[4]“How NPM Malware Works | Phylum.io,” Phylum, Aug. 28, 2020. https://blog.phylum.io/nodejs-npm-malicious-javascript-package/ (accessed Jan. 16, 2021).
[5]“How to make your NodeJS application or API secure | by Andreas DEV | ITNEXT.” https://itnext.io/make-security-on-your-nodejs-api-the-priority-50da8dc71d68 (accessed Jan. 16, 2021).
[6]A. DEV, “How to make your NodeJS dynamic application or API secure,” Medium, Aug. 27, 2020. https://itnext.io/make-security-on-your-nodejs-api-the-priority-50da8dc71d68 (accessed Jan. 16, 2021).
[7]“How to prevent malicious packages | Snyk.” https://snyk.io/blog/publishing-malicious-packages/ (accessed Jan. 16, 2021).
[8]“The Anatomy of a Malicious NPM package,” Phylum, Aug. 21, 2020. https://blog.phylum.io/malicious-javascript-code-in-npm-malware/ (accessed Jan. 16, 2021).
Last updated