
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
@overcoder/vue-context-menu
Advanced tools
The plugin is VERY minimal and does NOT provide any styling or anything. This simplifies context menus implementation but that's it.
There are three steps for using this plugin.
<template>
...
<ContextMenu ref="contextMenu">
interesting stuff
</ContextMenu>
</template>
<script>
import ContextMenu from '@overcoder/vue-context-menu';
export default {
...
components: {
...
ContextMenu,
},
};
</script>
<ul>
<li v-for="cats in cat" :key="cat.id"
@contextmenu.prevent="event => contextMenu.open(event)">
{{ cat.name }}
</li>
</ul>
Test it out, context menu should work now (assuming
cats
).
Ok first of all you noticed the event
is passed to contextMenu.open
and this is to determine mouse location etc.
Now this plugin supports thing called contexts, here's an example:
<ul>
<li v-for="cats in cat" :key="cat.id"
@contextmenu.prevent="event => contextMenu.open(event, cat)">
{{ cat.name }}
</li>
</ul>
You can see we provided the cat
as the second parameter to contextMenu.open
. We gave it a context. Now you can access this context within the menu itself:
<ContextMenu ref="contextMenu">
<template v-slot="slotProps"> <!-- slotsProps are props passed from child to slot in parent -->
<!-- Now, here slotProps.ctx does contain the context (cat) BUT -->
<template v-if="slotProps.ctx"> <!-- we need to add this since context is null on initial render -->
<!-- Now we can peacefully access slotProps.ctx without getting any errors -->
{{ slotProps.ctx.name }}
<template>
</template>
</ContextMenu>
That's all I think.
close()
closes the menuopen()
without passing an event to open the menu at last position (defaults to 0,0)FAQs
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.