Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@digitalcredentials/lru-memoize
Advanced tools
A Memoized wrapper around the javascript
lru-cache
library.
(Forked from digitalbazaar/lru-memoize
v2.0.0
to provide TypeScript and ReactNative compatibility.)
lru-memoize is used to
to memoize promises
(as opposed to just the results of the operations),
which helps in high-concurrency use cases. (And in turn, it uses
lru-cache
under the hood.)
The memoized LruCache
constructor passes any options given to it through to
the lru-cache
constructor, so see that repo for the full list of cache
management options. Commonly used ones include:
max
(default: 100) - maximum size of the cache.maxAge
(default: 5 sec/5000 ms) - maximum age of an item in ms.updateAgeOnGet
(default: false
) - When using time-expiring entries with
maxAge
, setting this to true will make each entry's effective time update to
the current time whenever it is retrieved from cache, thereby extending the
expiration date of the entry.To install locally (for development):
git clone https://github.com/digitalcredentials/lru-memoize.git
cd lru-memoize
npm install
PRs accepted.
If editing the Readme, please conform to the standard-readme specification.
FAQs
LRU Memoize
We found that @digitalcredentials/lru-memoize demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 7 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.