
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
@marktext/i18n
Advanced tools
Our official website address, you can learn more about the content of the inspiration box on the official website
First look for Locale Identifier: zh(take zh as an example) in your country or region in the locale-identifiers.json file. See if there is already a folder named zh in the locales folder, if not, create a folder with zh and copy the files in the en folder into the zh folder, translating the field values from the translation.json file into the language of your country or region. Note that during translation, the {{count}} text is retained.
Since the Inkio is constantly iterating, so some new text will be added, so the existing translations are likely to be outdated, when you find outdated or missing translations in the process of using the Inkio, we are very welcome to modify or add new translations, in the locales/en folder of the translation.json file, you can find all the text that needs to be translated, of course, the syntax in this file will also have errors, welcome to correct
FAQs
i18n of Inkio
We found that @marktext/i18n demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.