
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
IMPORTANT NOTE: THE AATI PACKAGE MANAGER IS AN INCOMPLETE PROJECT! IT CAN EXPERIENCE BREAKING CHANGES AT ANY MOMENT WITHOUT NOTICES! USE AATI AT YOUR OWN RISK!
Aati is a Cross-platform Package Manager written in Rust.
The Aati Package Manager focuses on providing a Simple, Efficient and Performant Interface for installing, managing and removing packages that uses a PKGFILE-based packaging system that's easy to use and adopt. Aati has a backend library and a command-line frontend both written in Rust.
Read the Wiki for more Information how to install Aati, use it, package applications for it, etc.
Simply: It was so fun to develop. I always thought of building my own package manager, so here it goes!
Any contributions to Aati are welcomed. This Project is definitely incomplete and immature, so any development is appreciated.
Aati's upstream development is hosted on sr.ht, there is a GitHub mirror nonetheless. Contribue either by submitting a GitHub pull request or by sending patches to the development mailing list.
The Aati Package Manager is licensed under the GNU General Public License V3.0.
FAQs
Unknown package
We found that aati-backend demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.