Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@mathigon/studio
Advanced tools
A platform for creating and hosting interactive, online courses.
Welcome to Mathigon Studio – an award-winning platform for creating interactive, online courses!
This repository is not intended to be used standalone. You will need to create a parent repository
containing the content, settings, and any customisations for this course. You can see a sample
repository at docs/example. Then install Mathigon Studio as a dependency using
npm install @mathigon/studio
.
For more details on how to set up a server, customise its settings, and create interactive courses, take a look at our documentation:
Here is a breakdown of all the components included in this repository:
.ts
or .scss
file in this directory will
get bundled into a separate .js
or .css
file in the public
directory.We welcome any contributions to Mathigon Studio: from bug fixes to writing more documentations, adding new translations, or developing entirely new features. If you find any bugs or errors, please file an issue.
Before submitting a pull request, you will need to sign the Mathigon Individual Contributor License Agreement.
If you want to work for Mathigon, visit our careers page, and contact us if you have any questions.
© Mathigon 2016–2022, All rights reserved
FAQs
A platform for creating and hosting interactive, online courses.
The npm package @mathigon/studio receives a total of 7 weekly downloads. As such, @mathigon/studio popularity was classified as not popular.
We found that @mathigon/studio demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.