
Security News
/Research
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
@bagaar/eslint-config-ember
Advanced tools
@bagaar/eslint-config-ember
is built and maintained by Bagaar.
EsLint config for Bagaar Ember addons and projects.
⚠️ @bagaar/eslint-config-ember
overrides rules provided by the ember-plugin-eslint
plugin. Make sure it is installed and configured properly.
npm install @bagaar/eslint-config-ember --save-dev
yarn add @bagaar/eslint-config-ember --dev
Add @bagaar/eslint-config-ember
to the extends
array of your .eslintrc.js
file.
// .eslintrc.js
module.exports = {
extends: [
'eslint:recommended',
'@bagaar/eslint-config',
'plugin:ember/recommended',
'@bagaar/eslint-config-ember'
]
};
This project is licensed under the MIT License.
0.5.0 (2019-02-04)
Since @bagaar/eslint-config-ember
does not override any rules of @bagaar/eslint-config
, extending has no real benefit besides not having to include @bagaar/eslint-config
inside a project's extends.
Removing the extend also has the benefit that we can switch out the ESLint specific config without having to change this library.
chore: Update the README
Remove references to @bagaar/eslint-config-ember
and add a note about the eslint-plugin-ember dependency.
<a name="0.4.0"></a>
FAQs
EsLint config for Bagaar Ember addons and projects.
We found that @bagaar/eslint-config-ember demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.