
Security News
npm Adopts OIDC for Trusted Publishing in CI/CD Workflows
npm now supports Trusted Publishing with OIDC, enabling secure package publishing directly from CI/CD workflows without relying on long-lived tokens.
@nlpjs/builtin-compromise
Advanced tools
Builtin Named Entity Recognition with Compromise
builtin-compromise
A golden entity extractor that runs in the browser.
Based on https://github.com/spencermountain/compromise
The Microsoft based builtins extractor only works for nodejs so this package is intended to provide golden entity extraction where nlp.js is being used in a browser.
See compromise documentation for details.
const { BuiltinCompromise } = require('@nlpjs/builtin-compromise');
const container = await containerBootstrap();
const builtin = new BuiltinCompromise({})
// Set enable to restrict list of entity extractors
const builtin = new BuiltinCompromise({
enable: [
'hashtags', 'person', 'place', 'organization',
'email', 'phonenumber', 'date', 'url', 'number', 'dimension'
]
});
container.register('extract-builtin-??', builtin, true);
FAQs
Builtin Named Entity Recognition with Compromise
The npm package @nlpjs/builtin-compromise receives a total of 104 weekly downloads. As such, @nlpjs/builtin-compromise popularity was classified as not popular.
We found that @nlpjs/builtin-compromise demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
npm now supports Trusted Publishing with OIDC, enabling secure package publishing directly from CI/CD workflows without relying on long-lived tokens.
Research
/Security News
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.