
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
@excsn/c5store
Advanced tools
C5Store is an all encompassing configuration store. The idea is to have one place to query and dump configuration, secrets and etc.
Read more about it: https://github.com/normano/c5store
To start using C5Store in yor NodeJS application.
npm i @excsn/c5storeyarn add @excsn/c5storeimport {createC5Store, defaultConfigFiles, C5Store, C5StoreMgr} from "@excsn/c5store";
Create a config folder with common.yaml
foo: bar example: test: it: "today" my: 42
Create and use the store
let [c5Store, c5StoreMgr] = await createC5Store(configFilePaths: ["common.yaml"]);
// Use the store
let data = c5Store.get("foo");
// Use to get nested data by branching.
let nestedData = c5Store.branch("example.test").get("my");
// Inspect where you are on a branch
console.log(c5Store.branch("example.test").currentKeyPath);
Look at the example folder for an implementation and how to use the C5FileValueProvider to get data from a file.
FAQs
All encompassing configuration store to meet all needs.
The npm package @excsn/c5store receives a total of 0 weekly downloads. As such, @excsn/c5store popularity was classified as not popular.
We found that @excsn/c5store demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.