Research
Security News
Malicious PyPI Package ‘pycord-self’ Targets Discord Developers with Token Theft and Backdoor Exploit
Socket researchers uncover the risks of a malicious Python package targeting Discord developers.
@backbase/eslint-config-backbase
Advanced tools
Backbase's eslint configuration option
Name | eslint-config |
---|---|
Version | 1.0.0 |
Binary | N/A |
Public | ✔ |
Registry | https://www.npmjs.com/package/@backbase/eslint-config-backbase |
Owner | dragos@backbase.com |
Status |
npm install --save-dev @backbase/eslint-config-backbase
If you want to extend a specific configuration file, you can use the extends property and specify the path to the file. The path can be either relative or absolute.
Configurations can be extended by using:
Shareable configuration package The extended configuration provides base rules, which can be overridden by the configuration that references it. For example:
extends: "@backbase/eslint-config-backbase"
#Override any settings from the "parent" configuration
quotes:
- 1
- "double"
{
"extends": "@backbase/eslint-config-backbase",
"rules": {
"quotes": [2, "double"]
}
}
@todo
FAQs
Backbase's eslint configuration options
We found that @backbase/eslint-config-backbase demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover the risks of a malicious Python package targeting Discord developers.
Security News
The UK is proposing a bold ban on ransomware payments by public entities to disrupt cybercrime, protect critical services, and lead global cybersecurity efforts.
Security News
Snyk's use of malicious npm packages for research raises ethical concerns, highlighting risks in public deployment, data exfiltration, and unauthorized testing.