
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
@gooddata/experimental-workspace
Advanced tools
GoodData SDK - Experimental workspace for features in dev
This package is a part of the GoodData.UI SDK. To learn more, check the source monorepo.
This project contains LDM and recordings captured from the GoodData workspace on staging where we deploy new backend functionality. The experimental workspace is useful during development and testing of integration with the new backend functionality before it lands on the production and can be tested on top of the reference workspace.
This is stored in src/md and consists of two files:
The auto-generated full.ts - this is created by running npm run refresh-md script
Note: the script has an existing workspace from staging3.intgdc.com hardcoded. This is not available
outside of GoodData.
(C) 2017-2022 GoodData Corporation
This project is under MIT License. See LICENSE.
FAQs
GoodData SDK - Experimental workspace for features in dev
The npm package @gooddata/experimental-workspace receives a total of 27 weekly downloads. As such, @gooddata/experimental-workspace popularity was classified as not popular.
We found that @gooddata/experimental-workspace demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 49 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.