Security News
New Python Packaging Proposal Aims to Solve Phantom Dependency Problem with SBOMs
PEP 770 proposes adding SBOM support to Python packages to improve transparency and catch hidden non-Python dependencies that security tools often miss.
@openui5/sap.ui.mdc
Advanced tools
Runtime resources of the OpenUI5 UI Library sap.ui.mdc.
This library is restricted to use by SAP internal projects only.
The components of this library are under development and documented as private. Their APIs are subject to change and should not be used in productive scenarios without further agreement. A general availability of sap.ui.mdc will be announced via the usual channels.
According to the usage restrictions mentioned above we will not accept or process contributions and issues and would like to ask you to refrain from them.
Add this library as a dependency to your UI5 project by using UI5 Tooling:
ui5 add sap.ui.mdc
For more information, please refer to our documentation on Consuming OpenUI5 Libraries.
OpenUI5 is licensed under Apache License 2.0, see LICENSE.txt. Subcomponents may have different licenses, see THIRDPARTY.txt.
FAQs
OpenUI5 UI Library sap.ui.mdc
We found that @openui5/sap.ui.mdc demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
PEP 770 proposes adding SBOM support to Python packages to improve transparency and catch hidden non-Python dependencies that security tools often miss.
Security News
Socket CEO Feross Aboukhadijeh discusses open source security challenges, including zero-day attacks and supply chain risks, on the Cyber Security Council podcast.
Security News
Research
Socket researchers uncover how threat actors weaponize Out-of-Band Application Security Testing (OAST) techniques across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.