Security News
The Risks of Misguided Research in Supply Chain Security
Snyk's use of malicious npm packages for research raises ethical concerns, highlighting risks in public deployment, data exfiltration, and unauthorized testing.
@bnqkl/web-component
Advanced tools
该项目使用 stencil 作为组件标准进行开发,它提供了很多便捷的开箱即用的标准,以及高度可定制的编译工具链,使得我们可以跟 angular 项目的编译实时联动。 该项目的主要风格并不是传统的 UI 库,而是更加纯粹的功能性仓库,是对于现代 HTML5 基础组件的一些补充。
如果确定要使用其它框架或者标准,请联系 [@kzf] 进行搭建,或者自己学习 storybook 自行搭建并分享
安装 Install
# use npm
npm install @bnqkl/web-component
# use yarn
yarn install @bnqkl/web-component
使用 Usage
纯 Web 技术下,下载依赖包,使用 dist/umd/index.js
导入到你的网页中
<-- head -->
<script type="module" src="@bnqkl/web-component/dist/bnqkl-web-component/bnqkl-web-component.esm.js" />
<-- body -->
<bn-some-com></bn-some-com>
或者如果你能够对项目进行编译,那么在项目源码中导入,并执行 web-component 组件的注册,因为在此之前,你可以等待一些垫片的加载
import { defineCustomElements } from "@bnqkl/web-component";
defineCustomElements();
在项目中使用标签
<bn-icon-comment></bn-icon-comment>
FAQs
Bnqkl Web Component
The npm package @bnqkl/web-component receives a total of 0 weekly downloads. As such, @bnqkl/web-component popularity was classified as not popular.
We found that @bnqkl/web-component demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Snyk's use of malicious npm packages for research raises ethical concerns, highlighting risks in public deployment, data exfiltration, and unauthorized testing.
Research
Security News
Socket researchers found several malicious npm packages typosquatting Chalk and Chokidar, targeting Node.js developers with kill switches and data theft.
Security News
pnpm 10 blocks lifecycle scripts by default to improve security, addressing supply chain attack risks but sparking debate over compatibility and workflow changes.