Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@looker/icons
Advanced tools
Icons are defined in SVG format and are automatically built by a build script to ensure they remain consistent.
Icons are defined in SVG format and are automatically built by a build script to ensure they remain consistent.
svg
: All source SVG icon files are placed here. The build process uses the files in this directory to create components.src/*
: Built artifacts are placed into this directory.All icons should be exported as SVG and placed in the svg
directory. They do not need to be optimized beforehand, the build process will optimize them and convert them to components.
When adding new icons run the build script below to output the optimized React-component versions.
yarn workspace @looker/icons build
Adding new icons to svg
and failing to re-run the command above will result in a lint failure.
When adding a new icon, the name given to the icon should aim to be a succinct and semantic representation of the icon's use, not its artwork. For example, Warning
not Triangle With Exclamation Point
. While this rule can be broken in some cases, it is the recommended way to name icons as well as something that will be reviewed when submitting new icons.
FAQs
Icons are defined in SVG format and are automatically built by a build script to ensure they remain consistent.
The npm package @looker/icons receives a total of 166 weekly downloads. As such, @looker/icons popularity was classified as not popular.
We found that @looker/icons demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 9 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.