
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
@gooddata/frontend-npm-scripts
Advanced tools
A collection of helper scripts used for processing the frontend codebase.
This is a collection of various npm scripts used throughout our frontend codebase in package.jsons.
They usually do some sort of pre- or post-processing on frontend code files, the scripts' behavior is described below.
Install Node.js (node 12.16.1, npm v6.13.4) and Yarn 1.22.4.
Install dependencies:
yarn install --frozen-lockfile
Updates the copyright header in JS/TS(X) and SCSS files if needed according to our internal copyright specification. If there is no copyright on line 1, it automatically adds the default one. Watch out: this applies also to files which contain copyrights on other lines! Usage (if this package is installed):
$ gdc-fix-copyright [FILE1] [FILE2] ...
Copyright © GoodData Corporation 2019, All rights reserved
No license granted. Unauthorized copying, modification, distribution, or use of this file is strictly prohibited.
FAQs
A collection of helper scripts used for processing the frontend codebase.
We found that @gooddata/frontend-npm-scripts demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 62 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.