Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
@effect/babel-plugin
Advanced tools
- [Why?](#why) - [Installation](#installation) - [Usage](#usage) - [Via `.babelrc` (Recommended)](#via-babelrc-recommended) - [Via CLI](#via-cli) - [Via Node API](#via-node-api) - [Transformers](#transformers) - [Rewrite Pipe](#rewrite-pipe) - [
This Babel plugin helps to improve the performance of functional code written with the @fp-ts/*
and @effect/*
ecosystem of libraries.
There are two transformers contained within this plugin:
rewritePipe
rewriteIdentity
npm install -D @effect/babel-plugin
or
yarn add -D @effect/babel-plugin
or
pnpm install -D @effect/babel-plugin
.babelrc
(Recommended).babelrc
{
"plugins": ["@effect/babel-plugin"]
}
babel --plugins @effect/babel-plugin script.js
require("babel-core").transform("pipe(a, f(() => b))", {
plugins: ["@effect/babel-plugin"],
})
The following configuration options can also be passed to @effect/babel-plugin
:
/**
* The configuration options for `@effect/babel-plugin`.
*/
export interface PluginConfig {
/**
* Rewrites calls to `pipe` to directly call the piped functions.
*
* By default, the plugin will only rewrite calls to `pipe` imported from
* `@fp-ts/core/Function`. However, the `targetImports` configuration option
* can be used to allow the plugin to rewrite calls to `pipe` imported from
* custom paths.
*/
readonly rewritePipe?: false | {
targetImports: ReadonlyArray<string>
}
/**
* Rewrites calls to `identity` to remove them entirely.
*
* By default, the plugin will only rewrite calls to `identity` imported from
* `@fp-ts/core/Function`. However, the `targetImports` configuration option
* can be used to allow the plugin to rewrite calls to `identity` imported
* from custom paths.
*/
readonly rewriteIdentity?: false | {
targetImports: ReadonlyArray<string>
}
}
The objective of this Babel transformer is to improve the performance of pipeable APIs by re-writing calls to pipe
at compile time to directly call the piped methods.
Concretely, this results in the following code example:
pipe(a, f(() => b), g(() => c))
being transformed into direct calls to the previously piped functions:
g(() => c)(f(() => b)(a))
Calls to pipe
are considered CallExpression
s in the Babel AST. To ensure that all calls to pipe are re-written correctly, the following cases are handled:
pipe
is imported as a variable from a module and referenced as an Identifier
in the ASTpipe
is imported as a namespace from a module and referenced as part of a MemberExpression
The objective of this Babel transformer is to improve the performance of
pipeable APIs by re-writing calls to identity
at compile time to remove
them entirely
Concretely, this results in the following code example:
identity(a)
being transformed to remove calls to identity
:
a;
Calls to identity
will also be removed when part of a pipe
call:
pipe(a, identity, f(() => b))
will be transformed to:
f(() => b)(a);
FAQs
- [Why?](#why) - [Installation](#installation) - [Usage](#usage) - [Via `.babelrc` (Recommended)](#via-babelrc-recommended) - [Via CLI](#via-cli) - [Via Node API](#via-node-api) - [Transformers](#transformers) - [Rewrite Pipe](#rewrite-pipe) - [
The npm package @effect/babel-plugin receives a total of 8 weekly downloads. As such, @effect/babel-plugin popularity was classified as not popular.
We found that @effect/babel-plugin demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.