
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
@compas/code-gen
Advanced tools
All common components for creating backends, tooling and more in opinionated packages; from describing the api structure to testing the end result.
I had a time when I was mostly creating small backends and tools back to back. Always trying to improve them by choosing packages that align better with my views, new features or more opinionated defaults. To capture this flow and making those backends and tools easier to maintain, Compas was created.
New features added should fall under the following categories:
compas docker commands or various utilities provided by
@compas/stdlibAlthough some parts heavily rely on conventions set by the packages, we currently aim not to be a framework. We aim to provide a good developer experience, useful abstractions around the basics, and a stable backend <-> client interface.
See the website for the changelog, all available APIs and various guides.
For contributing see contributing.md.
FAQs
Generate various boring parts of your server
The npm package @compas/code-gen receives a total of 536 weekly downloads. As such, @compas/code-gen popularity was classified as not popular.
We found that @compas/code-gen demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.