
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
@hon2a/icepick-fp
Advanced tools
Wrapper around the popular Icepick library providing a FP contract.
Wrapper around the popular Icepick library providing a FP contract.
Install using
npm install @hon2a/icepick-fp
Import using
import { assocIn, dissocIn/*, ...*/ } from '@hon2a/icepick-fp'
// or individually:
import assocIn from '@hon2a/icepick-fp/assocIn'
Wrappers are provided just for the most often used Icepick transforms for now:
assocIn
(and setIn
alias), getIn
, updateIn
, assign
, and merge
. They're
enhanced with lodash.topath
to accept String
paths:
getIn('a.b[0].c')({ a: { b: [{ c: 42 }] } })
// => 42
The freeze
and thaw
helpers are also re-exported.
Additionally, there's a dissocIn
transform (deletes just the leaf property)
dissocIn('a.b.c')({ a: { b: { c: 42 } } })
// => { a: { b: {} } }
and a generic reduce
helper
reduce(
(val, idx) => setIn(val, idx),
{}
)(['a', 'b', 'c'])
// => { a: 1, b: 2, c: 3 }
Install dependencies using:
npm install
After you modify sources, run the following (or set up your IDE to do it for you):
npm run format
npm run lint
npm test
and fix the errors, if there are any.
Publishing is done in two steps:
npm version <patch|minor|major>
git push --follow-tags
npm publish --access public
FAQs
Wrapper around the popular Icepick library providing a FP contract.
We found that @hon2a/icepick-fp demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.