
Research
Security News
Malicious npm Packages Use Telegram to Exfiltrate BullX Credentials
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
@layerzerolabs/solhint-config
Advanced tools
Shared solhint configuration that defines Solidity rules and their severity for LayerZero codebase. It should be used in all LayerZero repositories containing Solidity contracts to ensure the uniform conventions. The full list of solhint
rules can be found in solhint
repository.
solhint
package specified in peerDependencies
section of package.config
@layerzerolabs/solhint-config
yarn add --dev @layerzerolabs/solhint-config
Create solhint.config.js
file to configure solhint
.
If you want to use only the default rules put the following line in solhint.config.js
module.exports = require("@layerzerolabs/solhint-config");
If you want to override the default rules use the following format for solhint.config.js
const defaults = require("@layerzerolabs/solhint-config");
module.exports = {
...defaults,
rules: {
...defaults.rules,
"compiler-version": ["error", "0.8.20"], // override
},
};
To lint all files inside contracts
directory run
yarn solhint contracts/**/*.sol
To lint a single file run
yarn solhint contracts/MyContract.sol
FAQs
LayerZero Solhint Config
The npm package @layerzerolabs/solhint-config receives a total of 693 weekly downloads. As such, @layerzerolabs/solhint-config popularity was classified as not popular.
We found that @layerzerolabs/solhint-config demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.
Security News
AI-generated slop reports are making bug bounty triage harder, wasting maintainer time, and straining trust in vulnerability disclosure programs.