
Security News
Feross on the 10 Minutes or Less Podcast: Nobody Reads the Code
Socket CEO Feross Aboukhadijeh joins 10 Minutes or Less, a podcast by Ali Rohde, to discuss the recent surge in open source supply chain attacks.
@node-fi/default-token-list
Advanced tools
Official token list of Node
To add a token to Node:
yarn install. Note: you must be on Node.js 14.x or later to do this.assets/ (it must be a PNG less than 200px by 200px or an svg)src/<network>.token-list.json, where <network> is the name of the network your token is deployed to.yarn build to regenerate the main token list.Recommend the squoosh-cli.
yarn squoosh-cli --output-dir tmp/resized --resize '{width: 200}' --oxipng auto assets/asset_cETH.png
In certain cases such as if the proportions are not square or if automatic resize results in a larger file size than the orginal you will need to resize with another tool or re export from your graphics app.
MIT
FAQs
Node default token list
The npm package @node-fi/default-token-list receives a total of 3 weekly downloads. As such, @node-fi/default-token-list popularity was classified as not popular.
We found that @node-fi/default-token-list demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Socket CEO Feross Aboukhadijeh joins 10 Minutes or Less, a podcast by Ali Rohde, to discuss the recent surge in open source supply chain attacks.

Research
/Security News
Campaign of 108 extensions harvests identities, steals sessions, and adds backdoors to browsers, all tied to the same C2 infrastructure.

Security News
OpenAI rotated macOS signing certificates after a malicious Axios package reached its CI pipeline in a broader software supply chain attack.