
Research
/Security News
Intercomβs npm Package Compromised in Ongoing Mini Shai-Hulud Worm Attack
Compromised intercom-client@7.0.4 npm package is tied to the ongoing Mini Shai-Hulud worm attack targeting developer and CI/CD secrets.
@nextui-org/react
Advanced tools
NOTE: This is a community project, not associated with Vercel.
Visit https://nextui.org/guide to get started with NextUI.
Visit https://nextui.org/docs to view the full documentation.
Visit https://storybook.nextui.org to view the storybook for all components.
Canary versions are available after every merge into canary branch. You can install the packages with the tag canary in npm to use the latest changes before the next production release.
We're excited to see the community adopt NextUI, raise issues, and provide feedback. Whether it's a feature request, bug report, or a project to showcase, please get involved!
Contributions are always welcome!
See CONTRIBUTING.md for ways to get started.
Please adhere to this project's CODE_OF_CONDUCT.
FAQs
π Beautiful and modern React UI library.
The npm package @nextui-org/react receives a total of 51,590 weekly downloads. As such, @nextui-org/react popularity was classified as popular.
We found that @nextui-org/react demonstrated a not healthy version release cadence and project activity because the last version was released a year ago.Β It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
/Security News
Compromised intercom-client@7.0.4 npm package is tied to the ongoing Mini Shai-Hulud worm attack targeting developer and CI/CD secrets.

Research
Socket detected a malicious supply chain attack on PyPI package lightning versions 2.6.2 and 2.6.3, which execute credential-stealing malware on import.

Research
A brand-squatted TanStack npm package used postinstall scripts to steal .env files and exfiltrate developer secrets to an attacker-controlled endpoint.