GithubHelp home page GithubHelp logo

capevace / email-tracker Goto Github PK

View Code? Open in Web Editor NEW
0.0 2.0 0.0 20 MB

Create trackers that tell you when emails were opened by embedding hidden images

License: MIT License

Dockerfile 1.06% JavaScript 95.08% CSS 3.87%
email tracking tracker read

email-tracker's Introduction

email-tracker

Create trackers that tell you when emails were opened by embedding hidden images

Usage

Using with Docker

You can download the container from docker (armv7 only).

docker pull capevace/email-tracker

You can also build your own docker image by cloning the repo and then building it.

git clone https://github.com/capevace/email-tracker
cd email-tracker
docker build . -t capevace/email-tracker

Using with npm

You can download the package from npm.

npm i -g email-tracker

Environment Variables

  • PORT (Number): set the port for the HTTP server

    Example:

    PORT=3000 email-tracker
  • DB_PATH (String): set the DB path

    Example:

    DB_PATH=../data/emails.db email-tracker

Screenshots

Screenshot 1 Screenshot 2
Screenshot 3 Screenshot 4
Screenshot 5 Screenshot 6
Screenshot 7 Screenshot 8

Changelog

2.0.1

  • 🩺 Removed documentation images from NPM release (20MB+ -> 17kb package size)

2.0.0

  • ➕ Added header tracking

    When the hidden image is loaded, header information sent along with the request will be saved in the database. This is useful to determine if the tracker was invoked not by a genuine open, but by a proxy caching email resources beforehand (GMail does this for example).

  • 🩺 Fixed mobile layout issues

Migration notice

If you've previously used v1.0.0, you'll need to run the following SQL on your SQLite .db, in order to make it compatible with v2.0.0:

ALTER TABLE events
  ADD headers TEXT;

1.0.0

  • 🚀 Initial release

email-tracker's People

Contributors

capevace avatar

Watchers

 avatar  avatar

email-tracker's Issues

同学,您这个项目引入了153个开源组件,存在6个漏洞,辛苦升级一下

检测到 Capevace/email-tracker 一共引入了153个开源组件,存在6个漏洞

漏洞标题:requests 代码注入漏洞
缺陷组件:[email protected]
漏洞编号:CVE-2020-28502
漏洞描述:Dan DeFelippi node-XMLHttpRequest是  (Dan DeFelippi)开源的一个应用软件。用于模拟浏览器XMLHttpRequest对象。
node-XMLHttpRequest before 1.7.0 存在代码注入漏洞,攻击者可利用该漏洞导致任意代码注入并运行。
影响范围:(∞, 1.6.2)
最小修复版本:1.6.2
缺陷组件引入路径:[email protected]>[email protected]>[email protected]>[email protected]>[email protected]>[email protected]

另外还有6个漏洞,详细报告:https://mofeisec.com/jr?p=id56b7

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.