A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
You can download actual release of our JavaScript library and the use it for your project or you can fork our repository.