Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
@edsdk/imgpen-example
Advanced tools
Examples of ImgPen image editor usage in web applications and websites
How to use ImgPen image editor code samples
Here is the couple of ImgPen usage examples in TypeScript/JavaScript code with comments.
Server side is also bundled in this repo to allow you upload edited images and update them on client. Backend is provided by File Uploader microservice based on Express.
Project can be built with Webpack and ran instantly after you download it, no other webserver (like Nginx or Apache) is required.
git clone https://github.com/edsdk/imgpen-example
cd imgpen-example
npm i
npm run start
Then open localhost:8080 URL in your browser and enjoy the demo.
There are two simple examples inside this demo, you can check there TypeScript source in src/imgpen-example.ts
. If you use EcmaScript (JavaScript) the code will be very similar for you.
Examples let you to edit images and upload them into www/images
directory.
In your project you will use the same File Uploader backend (other supported languages: PHP, Java, etc), probably as microservice.
BSD
FAQs
Examples of ImgPen image editor usage in web applications and websites
We found that @edsdk/imgpen-example demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.