
Research
/Security News
Intercom’s npm Package Compromised in Ongoing Mini Shai-Hulud Worm Attack
Compromised intercom-client@7.0.4 npm package is tied to the ongoing Mini Shai-Hulud worm attack targeting developer and CI/CD secrets.
@hipster/mdx2-issue-checker
Advanced tools
Wrapper around remark-cli to make it easier to check for MDX v2 syntax issues
This package is a simple tool to check for issues in the MDX2 files.
It's a wrapper of remark-cli which uses the remark-mdx plugin to check your .mdx files.
Default usage - Will check all the files in the current directory:
npx @hipster/mdx2-issue-checker
Specify a directory to check:
npx @hipster/mdx2-issue-checker /path/to/directory
Verbose mode - By default, it will only display the files with errors. If you want to see all files which the CLI has gone through, you can use the --verbose flag:
npx @hipster/mdx2-issue-checker --verbose
FAQs
Wrapper around remark-cli to make it easier to check for MDX v2 syntax issues
The npm package @hipster/mdx2-issue-checker receives a total of 122 weekly downloads. As such, @hipster/mdx2-issue-checker popularity was classified as not popular.
We found that @hipster/mdx2-issue-checker demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
/Security News
Compromised intercom-client@7.0.4 npm package is tied to the ongoing Mini Shai-Hulud worm attack targeting developer and CI/CD secrets.

Research
Socket detected a malicious supply chain attack on PyPI package lightning versions 2.6.2 and 2.6.3, which execute credential-stealing malware on import.

Research
A brand-squatted TanStack npm package used postinstall scripts to steal .env files and exfiltrate developer secrets to an attacker-controlled endpoint.