
Product
Announcing Socket Certified Patches: One-Click Fixes for Vulnerable Dependencies
A safer, faster way to eliminate vulnerabilities without updating dependencies
@mxenabled/sabotage
Advanced tools
Removing the need to access the UI for Sabotage, and allowing for the extension of Sabotage through awesome CLI or CI/CD integrations!
Removing the need to access the UI for Sabotage, and allowing for the extension of Sabotage through awesome CLI or CI/CD integrations!
Navigate to the release page and choose the version you would like to install.
Once you have downloaded the version for your arch that you would like to use you need to move the binary into your
/usr/local/bin directory or add the binary to your $PATH.
Also recommended to setup an alias.
alias sab="sabotage-cli"
You will need to generate an API Key in the Sabotage UI so that you can authenticate with the API.
Once you generate this Api Key you can store it in $HOME/.sabotage.yaml
You can add a host option as well if you would like to test on a different environment of Sabotage.
Example
# ~/.sabotage.yaml
api_key: supersecureapikey
host: https://sabotage.internal.mx
FAQs
Removing the need to access the UI for Sabotage, and allowing for the extension of Sabotage through awesome CLI or CI/CD integrations!
We found that @mxenabled/sabotage demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 8 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
A safer, faster way to eliminate vulnerabilities without updating dependencies

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.