
Product
Introducing Pull Request Stories to Help Security Teams Track Supply Chain Risks
Socket’s new Pull Request Stories give security teams clear visibility into dependency risks and outcomes across scanned pull requests.
@elvia/elvis-assets-icons
Advanced tools
import { clock } from '@elvia/elvis-assets-icons';
const clockSvg = clock.getIcon(color); // Color is optional
color: 'red' -> Makes the icon red
Our icon library is based on Streamline icons. The icons that are from Streamline is not made accessible under the same license as this npm package. Those icons are still the property of Webablys LLC. Elvia has bought a license for the use of these icons in the organization. They can also be used in open source projects as long as you follow their license.
Streamline license information: https://help.streamlineicons.com/license-premium
icons/svg/src
. Ensure that the icons follow the naming pattern.config/icons.config.js
. Add appropriate terms.yarn build
.elvis
.elvis-assets-icons
and elvis
.FAQs
Elvia icons
The npm package @elvia/elvis-assets-icons receives a total of 454 weekly downloads. As such, @elvia/elvis-assets-icons popularity was classified as not popular.
We found that @elvia/elvis-assets-icons demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 7 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket’s new Pull Request Stories give security teams clear visibility into dependency risks and outcomes across scanned pull requests.
Research
/Security News
npm author Qix’s account was compromised, with malicious versions of popular packages like chalk-template, color-convert, and strip-ansi published.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.