Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@nomicfoundation/slang-linux-x64-musl
Advanced tools
Platform-specific binaries for @nomicfoundation/slang.
This is the x86_64-unknown-linux-musl binary for @nomicfoundation/slang
.
0.7.0
#502 c383238
Thanks @AntonyBlakey! - Added error recovery i.e. a CST is always produced, even if there are errors. The erroneous/skipped text is in the CST as a TokenKind::SKIPPED
token.
#501 cb221fe
Thanks @OmarTawfik! - generate typescript string enums for CST kinds
#517 8bd5446
Thanks @OmarTawfik! - extract inlined and sub-expressions in language grammar
#518 b3b562b
Thanks @OmarTawfik! - fill in missing CST node names
#515 f24e873
Thanks @OmarTawfik! - switch over the NPM package to use CommonJS modules instead of ES modules.
#498 44f1ff7
Thanks @OmarTawfik! - flatten unnamed CST nodes into parent nodes
#502 c383238
Thanks @AntonyBlakey! - Use the Rowan model for the CST i.e. TokenNodes contain the string content, and RuleNodes contain only the combined length of their children's text.
#499 1582d60
Thanks @OmarTawfik! - preserve correct ranges on empty rule nodes
#500 73ddac9
Thanks @OmarTawfik! - inlining CST nodes that offer no additional syntactic information
#512 72dc3d3
Thanks @AntonyBlakey! - Expression productions now correctly wrap the recursive 'calls' in a rule node
FAQs
Platform-specific binaries for @nomicfoundation/slang.
The npm package @nomicfoundation/slang-linux-x64-musl receives a total of 15,836 weekly downloads. As such, @nomicfoundation/slang-linux-x64-musl popularity was classified as popular.
We found that @nomicfoundation/slang-linux-x64-musl demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.