
Research
Two Malicious Rust Crates Impersonate Popular Logger to Steal Wallet Keys
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
@jackfranklin/rollup-plugin-import-glob
Advanced tools
A Rollup plugin to import a glob of files. When a matching import is found a new JS file is created that contains all the imports of any files matching the glob.
npm install --save-dev @jackfranklin/rollup-plugin-import-glob
yarn add --dev @jackfranklin/rollup-plugin-import-glob
The plugin looks for imports that start with glob:
and are followed by a regex.
Each matched import is a named export in the form fileX
, where X
starts at 0:
import * as posts from 'glob:./posts/*.js'
// posts will look like so:
{
file0: {
default: ...,
// and any named exports
},
file1: {
default: ...,
// and any named exports
},
/// and so on for as many files as were found
}
import importGlob from '@jackfranklin/rollup-plugin-import-glob'
export default {
input: 'your-app.js',
plugins: [importGlob()],
}
There are currently no configuration options available for the plugin.
FAQs
Import a glob of files using Rollup
We found that @jackfranklin/rollup-plugin-import-glob demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.