
Product
Reachability for Ruby Now in Beta
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.
@atomisthq/pulumi-dev
Advanced tools
@atomisthq/pulumiLibrary of Pulumi infrastructure-as-code (IAC) TypeScript helper functions and types.
You can add the dependency to your package as you usually would.
$ npm install @atomisthq/pulumi
Contributions to this project from community members are encouraged and appreciated. Please review the Contributing Guidelines for more information. Also see the Development section in this document.
This project is governed by the Code of Conduct. You are expected to act in accordance with this code by participating. Please report any unacceptable behavior to code-of-conduct@atomist.com.
Follow @atomist on Twitter and The Atomist Blog.
General support questions should be discussed in the #help channel in the
Atomist community Slack workspace.
If you find a problem, please create an issue.
Install dependencies.
$ npm ci
Make your changes, run the build.
$ npm run build
Commit your changes and push.
Push a release semantic version tag.
$ t=v$(jq -r .version package.json) && git tag -s -m "$t: Some release" "$t" && git push origin "$t"
You can create a prerelease by pushing a prerelease semantic version tag.
Created by Atomist. Need Help? Join our Slack workspace.
FAQs
Library of Pulumi IAC TypeScript helper functions and types
We found that @atomisthq/pulumi-dev demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.