
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
@cmdpalette/react
Advanced tools

A Command Palette Library for your Website or Webapp
npm install @cmdpalette/core @cmdpalette/react
See https://cmdpalette.dev/ for example usage.
commands: Array<ICmdCommand> | () => Promise<Array<ICmdCommand>> - An array of commands to be displayed in the palette. Each command is an object with the following properties:
count: number - The number of commands to be displayed in the palette, defaults to 10
open: boolean - To control the openeing and closing of the palette manually, defaults to false. The palette will self open and close using the key command check if this is not set.
placeholder: string - The placeholder text to be displayed in the search input, defaults to ""
keyCommandCheck: (e: KeyboardEvent) => boolean - To control if the palette should self open and close using a key command check, defaults checking for ctrl+k || command+k.
MIT
FAQs
A command Palette for React websites
We found that @cmdpalette/react demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.