
Security News
Risky Biz Podcast: Making Reachability Analysis Work in Real-World Codebases
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
@oracle/oraclejet-audit
Advanced tools
Oracle JET audits run against the application files of your JET project and perform a static analysis of the source code from an Oracle JET perspective. Audit messages result from an invocation of the Oracle JET Audit Framework (JAF) command-line utility and are governed by rules that are specific to a JET release version. As such, you can update the framework installation for a new Oracle JET release or configure the Oracle JAF audit for a previous release.
With Oracle JAF installed, audits that you perform against your Oracle JET application run in a Command-Line Interface, similar to the Oracle JET CLI. The installation of JAF provides a lint-style command-line utility named "ojaf" that audits JET application files (currently HTML, JS, CSS, and JSON) by applying rules that perform a static analysis from an Oracle JET perspective. The audit messages returned by invocation of the "ojaf" utility result from a rule set that is specific to the Oracle JET release version of the application. As new versions of Oracle JET are released, Oracle JAF and the applicable rules may be updated. For this reason, you will want to update JAF regularly.
Please see the JET Audit Framework for details.
For web app development, install this module as follows:
npm install -g @oracle/oraclejet-audit
FAQs
JET AUDIT FRAMEWORK
The npm package @oracle/oraclejet-audit receives a total of 24 weekly downloads. As such, @oracle/oraclejet-audit popularity was classified as not popular.
We found that @oracle/oraclejet-audit demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 8 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.