Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
@amplitude/ampli
Advanced tools
Amplitude CLI
Amplitude CLI requires Node 12+
$ npm install -g @amplitude/ampli
$ ampli COMMAND
running command...
$ ampli (-v|--version|version)
@amplitude/ampli/0.2.2 linux-x64 node-v12.22.7
$ ampli --help [COMMAND]
USAGE
$ ampli COMMAND
...
ampli autocomplete [SHELL]
ampli branch
ampli checkout [<branch>]
ampli help [COMMAND]
ampli init
ampli login
ampli logout
ampli pull [<source>] [-p <path>] [-b <branch>]
ampli source
ampli status
ampli whoami
ampli autocomplete [SHELL]
display autocomplete installation instructions
USAGE
$ ampli autocomplete [SHELL]
ARGUMENTS
SHELL shell type
OPTIONS
-r, --refresh-cache Refresh cache (ignores displaying instructions)
EXAMPLES
$ ampli autocomplete
$ ampli autocomplete bash
$ ampli autocomplete zsh
$ ampli autocomplete --refresh-cache
See code: @oclif/plugin-autocomplete
ampli branch
list all branches
USAGE
$ ampli branch
OPTIONS
-t, --token=token personal API token to authenticate with
ampli checkout [<branch>]
checkout a branch for the current source
USAGE
$ ampli checkout [<branch>]
OPTIONS
-t, --token=token personal API token to authenticate with
-v, --version=version the version to checkout
EXAMPLE
$ ampli checkout develop
ampli help [COMMAND]
display help for ampli
USAGE
$ ampli help [COMMAND]
ARGUMENTS
COMMAND command to show help for
OPTIONS
--all see all commands in CLI
See code: @oclif/plugin-help
ampli init
initialize your workspace
USAGE
$ ampli init
OPTIONS
-o, --org=org organization
-w, --workspace=workspace workspace
--user=user user email
EXAMPLES
$ ampli init [--org ORGANIZATION] [--workspace WORKSPACE]
$ ampli init [--user username@some.domain]
ampli login
log into Amplitude
USAGE
$ ampli login
EXAMPLE
$ ampli login
ampli logout
log out from Amplitude
USAGE
$ ampli logout
OPTIONS
--user=user user email
EXAMPLE
$ ampli logout [--user username@some.domain]
ampli pull [<source>] [-p <path>] [-b <branch>]
pull down the latest tracking plan and generate a tracking library
USAGE
$ ampli pull [<source>] [-p <path>] [-b <branch>]
OPTIONS
-b, --branch=branch the branch to pull
-p, --path=path where the tracking library will be created
-t, --token=token personal API token to authenticate with
-v, --version=version the version to pull
EXAMPLES
$ ampli pull web
$ ampli pull web -p ./ampli -b develop
$ ampli pull web -p ./ampli -b develop -v 2.1.1
ampli source
list all sources
USAGE
$ ampli source
OPTIONS
-t, --token=token personal API token to authenticate with
ampli status
verify (lint) your source code for analytics
USAGE
$ ampli status
OPTIONS
-b, --branch=branch enforces source is on provided the branch
-t, --token=token personal API token to authenticate with
-u, --update update tracking plan with latest implementation status
--skip-update-on-default-branch prevents updating implementation status on default branch
EXAMPLES
$ ampli status
$ ampli status -u
$ ampli status -b main
$ ampli status -u --skip-update-on-default-branch
ampli whoami
display user information
USAGE
$ ampli whoami
FAQs
Amplitude CLI
The npm package @amplitude/ampli receives a total of 26,475 weekly downloads. As such, @amplitude/ampli popularity was classified as popular.
We found that @amplitude/ampli demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 21 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.