@insaida/beacon
v1.0.0
Published
Lightweight canary for security research — confirms package import, CWD access, and write capability in JavaScript runtimes.
Readme
@insaida/beacon
Canary package for security research.
Purpose
This package confirms whether a JavaScript runtime can successfully import, execute, and interact with third-party packages. It is used in authorized security research.
What it does
- Lists the contents of the current working directory
- Writes a timestamped proof file (
.sandbox_canary_proof.txt) to CWD - Exports results for programmatic verification
What it does NOT do
- No network requests
- No system command execution
- No file access outside the current working directory
- No persistence mechanisms
- No obfuscation
The entire source is ~40 lines of straightforward JavaScript. Read it.
Usage
import { canary } from "@insaida/beacon";
console.log(canary.executed); // true
console.log(canary.writeSuccess); // true if CWD is writableResponsible Disclosure
This package is part of an authorized security research effort. If you have questions, contact the author.
License
MIT
