Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
@detalk/static
Advanced tools
⚡ The static files of Detalk(a simple comment plugin).
⚡ 您部署 Detalk 的最快方式。
在浏览器中,通常,您需要引入我们提供的 JavaScript 文件。它会暴露 window.detalk
接口。
<script src="https://cdn.jsdelivr.net/npm/@detalk/static@latest/dist/detalk.js"></script>
<!-- 我们推荐您将 @latest 替换为所需的版本号 -->
或者使用简短的链接:
<script src="https://cdn.jsdelivr.net/npm/@detalk/static@latest"></script>
<!-- 我们推荐您将 @latest 替换为所需的版本号 -->
当然,我们提供单独的 CSS 文件和 不含 CSS 的 JavaScript 构建:
<link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/@detalk/static@latest/dist/detalk.css">
<script src="https://cdn.jsdelivr.net/npm/@detalk/static@latest/dist/detalk-nocss.js"></script>
<!-- 我们推荐您将 @latest 替换为所需的版本号 -->
然后,您需要使用下方代码初始化:
detalk.init({
// 挂载点 (CSS 选择器)
el: "#app", // <div id="app"></div>
// 后端地址
url: "https://detalk.deta.dev/",
// 当前页面的路径
path: window.location.href,
// 是否开启实时预览
previewOnInput: false, // default is false
// 评论加载完成后
onCommentLoaded: function () {
// 此处可为代码高亮等插件
},
});
通常,一个页面只能挂载一个 Detalk。否则部分组件可能会出现错误。
FAQs
The fastest way to add Detalk (Based on Deta) to your website. | 将 Detalk (Based on Deta) 加入你的网站。
We found that @detalk/static demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.