
Security News
Packagist Urges Immediate Composer Update After GitHub Actions Token Leak
Packagist urges PHP projects to update Composer after a GitHub token format change exposed some GitHub Actions tokens in CI logs.
@twa-dev/sdk
Advanced tools
[](https://www.npmjs.com/package/@twa-dev/sdk)
npm package for Telegram Web Apps (TWA) SDK.
npm i @twa-dev/sdk
Telegram distributes SDK via link. It's kinda old fashion way to work with a library:
<html lang="en">
<head>
<title>TWA</title>
<meta charset="UTF-8">
<script src="https://telegram.org/js/telegram-web-app.js?56"></script>
<script>
window.Telegram.WebApp.showAlert('Hey there!');
</script>
</head>
<body></body>
</html>
This package allows to work with SDK as with a npm package:
import WebApp from '@twa-dev/sdk'
WebApp.showAlert('Hey there!');
And yes, it supports TS.
If you use React in your project, check out components that we have prepared for you.
These components significantly simplify developer experience.
FAQs
[](https://www.npmjs.com/package/@twa-dev/sdk)
The npm package @twa-dev/sdk receives a total of 20,273 weekly downloads. As such, @twa-dev/sdk popularity was classified as popular.
We found that @twa-dev/sdk demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Packagist urges PHP projects to update Composer after a GitHub token format change exposed some GitHub Actions tokens in CI logs.

Research
GemStuffer abuses RubyGems as an exfiltration channel, packaging scraped UK council portal data into junk gems published from new accounts.

Company News
Socket was named to the Rising in Cyber 2026 list, recognizing 30 private cybersecurity startups selected by CISOs and security executives.