
Product
Introducing Pull Request Stories to Help Security Teams Track Supply Chain Risks
Socket’s new Pull Request Stories give security teams clear visibility into dependency risks and outcomes across scanned pull requests.
github.com/boatilus/fox
A simple, dependency-free Go client for the Twilio programmatic fax API.
fox seeks to implement all the functions associated with Twilio's "Faxes" endpoint, but to keep the library tight, does not facilitate, for example, E.164 phone number parsing and validation, or handling Twilio status callbacks.
To get started, construct a new Client
with your Twilio account SID and auth token:
c := fox.NewClient("YOUR_TWILIO_ACCOUNT_SID", "YOUR_TWILIO_AUTH_TOKEN")
Optionally, you can also pass a pointer to a SendOptions
object to NewClient
to specify custom
send options (to, for example, tell Twilio not to store fax media):
opts := SendOpts{StoreMedia: false}
c := fox.NewClient("YOUR_TWILIO_ACCOUNT_SID", "YOUR_TWILIO_AUTH_TOKEN", &opts)
The Cancel
, Delete
, Get
, List
and Send
methods on the returned Client
are used to make the API calls as described by Twilio's API reference. For example, to retrieve a fax's data by its SID:
res, _ := c.Get("FXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX")
First, grab the testify package:
go get -u github.com/stretchr/testify
Then, run the tests (the -v
flag specifies verbose output):
go test -v
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket’s new Pull Request Stories give security teams clear visibility into dependency risks and outcomes across scanned pull requests.
Research
/Security News
npm author Qix’s account was compromised, with malicious versions of popular packages like chalk-template, color-convert, and strip-ansi published.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.