
Research
Supply Chain Attack on Axios Pulls Malicious Dependency from npm
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.
@m3e/avatar
Advanced tools
The m3e-avatar component is a reusable identity primitive that displays visual or textual representation with consistent sizing, shape, and typography.
This package is part of M3E monorepo, a unified suite of Material 3 web components. Explore the docs to see them in action.
npm install @m3e/avatar
This package includes a Custom Elements Manifest to support enhanced editor tooling and developer experience.
To enable autocomplete and hover documentation for @m3e/avatar, install the Custom Elements Manifest Language Server extension. It will automatically detect the manifest bundled with this package and surface tag names, attributes, slots, and events in supported files.
Alternately, you can explicitly reference the html-custom-data.json and css-custom-data.json in your workspace settings:
{
"html.customData": ["./node_modules/@m3e/avatar/dist/html-custom-data.json"],
"css.customData": ["./node_modules/@m3e/avatar/dist/css-custom-data.json"]
}
This package uses JavaScript Modules. To use it directly in a browser without a bundler, use a module script similar to the following.
<script type="module" src="/node_modules/@m3e/avatar/dist/index.js"></script>
In addition, you must use an import map to include dependencies.
<script type="importmap">
{
"imports": {
"lit": "https://cdn.jsdelivr.net/npm/lit@3.3.0/+esm",
"@m3e/core": "/node_modules/@m3e/core/dist/index.js"
}
}
</script>
For production, use index.min.js for faster load times.
m3e-avatar — An image, icon or textual initials representing a user or other identity.The following example illustrates use of the m3e-avatar to present textual initials.
<m3e-avatar>AB</m3e-avatar>
The next example illustrates use of the m3e-avatar to present an icon.
This example uses the
@m3e/iconpackage to present Material Design symbols, but any icon package can be substituted depending on your design system or preferences
<m3e-avatar>
<m3e-icon name="person"></m3e-icon>
</m3e-avatar>
The last example illustrates use of the m3e-avatar to present an image.
<m3e-avatar>
<img src="https://avatars.githubusercontent.com/u/224686995?s=48&v=4" />
</m3e-avatar>
This section details the slots and CSS custom properties available for the m3e-avatar component.
| Slot | Description |
|---|---|
| (default) | Renders the content of the avatar. |
| Property | Description |
|---|---|
--m3e-avatar-size | Size of the avatar. |
--m3e-avatar-shape | Border radius of the avatar. |
--m3e-avatar-font-size | Font size for the avatar. |
--m3e-avatar-font-weight | Font weight for the avatar. |
--m3e-avatar-line-height | Line height for the avatar. |
--m3e-avatar-tracking | Letter spacing for the avatar. |
--m3e-avatar-color | Background color of the avatar. |
--m3e-avatar-label-color | Text color of the avatar. |
See the root monorepo CONTRIBUTING.md for guidelines on contributing to this package.
This package is licensed under the MIT License.
FAQs
Avatar for M3E
We found that @m3e/avatar demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.

Security News
TeamPCP is partnering with ransomware group Vect to turn open source supply chain attacks on tools like Trivy and LiteLLM into large-scale ransomware operations.