
Security News
Axios Maintainer Confirms Social Engineering Attack Behind npm Compromise
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.
@todesktop/plugin-get-app-icon
Advanced tools
Retrieve the icon of a file or app.
Install @todesktop/client-get-app-icon in your client-side application using
npm install @todesktop/client-get-app-icon
Installation of the plugin package is also necessary. Using ToDesktop Builder, navigate to Plugins. Click on the Explore button for "Get App Icon" and install the package.
extractIconGet the icon of a file or app as a PNG image.
import { extractIcon } from "@todesktop/client-get-app-icon";
(async () => {
const icon = await extractIcon("/Applications/ToDesktop Builder.app");
console.log(icon);
// data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAKsAAADV.....
})();
import { extractIcon } from "@todesktop/client-get-app-icon";
(async () => {
const icon = await extractIcon({ pid: 12345 });
console.log(icon);
// data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAKsAAADV.....
})();
extractIcon(input)Parameters:
input - Either:
string - Path to the file or app (e.g., /Applications/App.app on macOS or C:\Program Files\App\app.exe on Windows){ pid: number } - Object with a pid property specifying the process IDReturns:
Promise<string> - A data URL containing the PNG image of the iconNotes:
.app bundle path from the process executableextractIcon({ pid: number }).app bundle path extraction on macOS when using PIDextractIcon now accepts either a string path or an object with a pid propertyFAQs
Retrieve the icon of a file or app.
We found that @todesktop/plugin-get-app-icon demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.