
Security News
/Research
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
@cloudflare/eslint-plugin-i18n
Advanced tools
A list of recommended rules for @cloudflare/eslint-plugin-i18n
A list of recommended rules for how to catch naked strings. A naked string is a string that is not internationalized.
You'll first need to install ESLint:
$ yarn -D eslint
Next, install eslint-plugin-i18n
:
$ yarn add eslint-plugin-i18n
Note: If you installed ESLint globally (using the yarn global
flag) then you must also install eslint-plugin-i18n
globally.
Add i18n
to the plugins section of your .eslintrc
configuration file. You can omit the eslint-plugin-
prefix:
{
"plugins": [
"i18n"
]
}
Then configure the rules you want to use under the rules section.
{
"rules": {
"i18n/rule-name": 2
}
}
This plugin will throw errors for:
variable declarations of naked string literals
ie) const foo = 'test'; <p>{foo}</p>
variable declarations of naked template literals
ie) const foo2 = `test`; <p>{foo}</p>
naked template literals inside of jsx expression containers
ie) const bar = <Trans id={`TESTING`} />
naked string literals inside of jsx expression containers
ie) <div>{'wtf'}</div>
FAQs
A list of recommended rules for @cloudflare/eslint-plugin-i18n
We found that @cloudflare/eslint-plugin-i18n demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 29 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.