
Security News
Another Round of TEA Protocol Spam Floods npm, But It’s Not a Worm
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.
@observablehq/notebook-inspector
Advanced tools
[](https://circleci.com/gh/observablehq/notebook-inspector/tree/master)
This library implements the default value rendering implementation for Observable notebooks. When plugged in to the Observable runtime as observers, inspectors can be used to insert DOM elements into the page or to render interactive inspectors for arbitrary values.
To install this library from npm:
npm install @observablehq/notebook-inspector
This library is also available for download from unpkg as an ES module and as a UMD bundle.
An inspector implements the Observable runtime’s Observer interface by rendering the current value of its associated variable to a given DOM element. Inspectors display DOM elements “as-is”, and create interactive “devtools”-style inspectors for other arbitrary values such as numbers and objects.
Creates a new inspector attached to the specified DOM element.
For example, to render a notebook into elements whose id attribute matches the variable name:
Runtime.load(notebook, variable => {
return new Inspector(document.getElementById(variable.name));
});
Or, to render a single variable into a new DIV element appended to the body:
Runtime.load(notebook, variable => {
if (variable.name === "chart") {
const div = document.createElement("div");
document.body.appendChild(div);
return new Inspector(div);
}
});
See also Inspector.into.
Applies the observablehq-running class to this inspector’s element.
# inspector.fulfilled(value) <>
Inspects the specified value, replacing the contents of this inspector’s element as appropriate, and dispatching an update event. If the specified value is a DOM element or text node, and the value is not already attached to the DOM, it is inserted into this inspector’s element, replacing any existing contents. Otherwise, for other arbitrary values such as numbers, arrays, or objects, an expandable display of the specified value is generated into this inspector’s element. Applies the observablehq class to this inspector’s element, and for non-element values, the observablehq--inspect class.
# inspector.rejected(error) <>
Inspects the specified error, replacing the contents of this inspector’s element as appropriate with the error’s description, and dispatching an error event. Applies the observablehq and observablehq--error class to this inspector’s element.
# Inspector.into(container) <>
Returns a function that when passed a given variable, returns a new inspector attached to a new DIV element within the specifier container element. If container is a string, it represents a selector, and the container element becomes the matching selected element. This method can be used with Runtime.load as the observer factory to conveniently render an entire notebook. For example, to render into the body:
Runtime.load(notebook, Inspector.into(document.body));
To render into a specific element:
Runtime.load(notebook, Inspector.into(".article .visualization"));
FAQs
[](https://circleci.com/gh/observablehq/notebook-inspector/tree/master)
The npm package @observablehq/notebook-inspector receives a total of 59 weekly downloads. As such, @observablehq/notebook-inspector popularity was classified as not popular.
We found that @observablehq/notebook-inspector demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.

Security News
PyPI adds Trusted Publishing support for GitLab Self-Managed as adoption reaches 25% of uploads

Research
/Security News
A malicious Chrome extension posing as an Ethereum wallet steals seed phrases by encoding them into Sui transactions, enabling full wallet takeover.