Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
@patterninc/react-ui
Advanced tools
React UI component library for use at [Pattern](https://pattern.com).
React UI component library for use at Pattern.
The package can be found at @patterninc/react-ui.
The project is setup to run using Yarn. You can install all dependencies by running yarn
.
To run the example app:
yarn start
To build the module to build, so the updated version can be used by other applications:
yarn build
The build makes the following available:
dist/react-ui.js
dist/styles.css
The JavaScript file contains no styles at all. You'll need to import both to get the look and feel. The following packages are peer dependencies to the library:
FAQs
React UI component library for use at [Pattern](https://pattern.com).
The npm package @patterninc/react-ui receives a total of 1,752 weekly downloads. As such, @patterninc/react-ui popularity was classified as popular.
We found that @patterninc/react-ui demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.