
Research
Security News
Malicious npm Packages Use Telegram to Exfiltrate BullX Credentials
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
@cscfi/csc-ui
Advanced tools
A cross-platform web component library that utilizes CSC Design System guidelines. It helps CSC developers to build applications with unified design. The components can be used with any browser and on top of any front-end framework.
See the documentation on how to use the web components and their attributes.
npm install
in root of the projectnpm run generate
in the root of the project to generate new componentsnpm run build:watch
in root of the projectThe root project generates a json that is used to generate the base of the documentation of the component.
npm install
in documentation/angularnpm start
in documentation/angularCreate an example for a new web component
ng g c examples/c-name-of-the-component
in documentation/angularThanks goes to these wonderful people (emoji key):
saulipurhonen 📖 💻 | Hang Le 💻 | villeerikssoncsc 📖 💻 ⚠️ 🚇 | csc-design-system-team 📖 🚇 💻 | Oskari Väistö 📖 🚇 💻 ⚠️ |
This project follows the all-contributors specification. Contributions of any kind welcome!
FAQs
CSC UI components
The npm package @cscfi/csc-ui receives a total of 137 weekly downloads. As such, @cscfi/csc-ui popularity was classified as not popular.
We found that @cscfi/csc-ui demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.
Security News
AI-generated slop reports are making bug bounty triage harder, wasting maintainer time, and straining trust in vulnerability disclosure programs.