
Security News
Feross on TBPN: How North Korea Hijacked Axios
Socket CEO Feross Aboukhadijeh breaks down how North Korea hijacked Axios and what it means for the future of software supply chain security.
@firstfleet/fflogger
Advanced tools
This is a centralized logger that sends logs to papertrail and to the console when process.env.NODE_ENV is not production
This package requires winston and winston-papertrail. In order to send logs to paper trail, you must set process.env.PAPERTRAIL_HOST and process.env.PAPERTRAIL_PORT. What thos values should be can be found on your papertrail account. Can also take process.env.PAPERTRAIL_PROGRAM to denote the program in the papertrail console, default to "default"
If the papertrail config is not setup the papertrail transport will not be created.
If you update the JS Docs you can rebuild the documentation by running
npm run build-docs
To publish to npm
npm loginnpm run sendFAQs
Log to Loggly, and console in dev
The npm package @firstfleet/fflogger receives a total of 0 weekly downloads. As such, @firstfleet/fflogger popularity was classified as not popular.
We found that @firstfleet/fflogger demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Socket CEO Feross Aboukhadijeh breaks down how North Korea hijacked Axios and what it means for the future of software supply chain security.

Security News
OpenSSF has issued a high-severity advisory warning open source developers of an active Slack-based campaign using impersonation to deliver malware.

Research
/Security News
Malicious packages published to npm, PyPI, Go Modules, crates.io, and Packagist impersonate developer tooling to fetch staged malware, steal credentials and wallets, and enable remote access.