Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
@percy/agent
Advanced tools
A low-level Node process for interacting with Percy.
$ npm install -g @percy/agent
$ percy COMMAND
running command...
$ percy (-v|--version|version)
@percy/agent/0.18.3 linux-x64 node-v10.16.3
$ percy --help [COMMAND]
USAGE
$ percy COMMAND
...
percy exec
percy finalize
percy help [COMMAND]
percy snapshot SNAPSHOTDIRECTORY
percy upload UPLOADDIRECTORY
percy exec
Start and stop Percy around a supplied command.
USAGE
$ percy exec
OPTIONS
-c, --config=config Path to percy config file
-h, --allowed-hostname=allowed-hostname Allowable hostname(s) to capture assets from
-p, --port=port [default: 5338] port
-t, --network-idle-timeout=network-idle-timeout [default: 50] asset discovery network idle timeout (in milliseconds)
EXAMPLES
$ percy exec -- echo "percy is running around this echo command"
$ percy exec -- bash -c "echo foo && echo bar"
See code: dist/commands/exec.ts
percy finalize
Finalize a build. Commonly used for parallelized builds, especially when the number of parallelized processes is unknown.
USAGE
$ percy finalize
OPTIONS
-a, --all (required)
EXAMPLE
$ percy finalize --all
[percy] Finalized parallel build.
See code: dist/commands/finalize.ts
percy help [COMMAND]
display help for percy
USAGE
$ percy help [COMMAND]
ARGUMENTS
COMMAND command to show help for
OPTIONS
--all see all commands in CLI
See code: @oclif/plugin-help
percy snapshot SNAPSHOTDIRECTORY
Snapshot a directory containing a pre-built static website.
USAGE
$ percy snapshot SNAPSHOTDIRECTORY
ARGUMENTS
SNAPSHOTDIRECTORY A path to the directory you would like to snapshot
OPTIONS
-b, --base-url=base-url [default: /] If your static files will be hosted in a subdirectory,
instead
of the webserver's root path, set that subdirectory with this flag.
-c, --config=config Path to percy config file
-h, --allowed-hostname=allowed-hostname Allowable hostname(s) to capture assets from
-i, --ignore-files=ignore-files Glob or comma-seperated string of globs for matching the files and
directories to ignore.
-p, --port=port [default: 5338] Port
-s, --snapshot-files=snapshot-files [default: **/*.html,**/*.htm] Glob or comma-seperated string of globs
for matching the files and directories to snapshot.
-t, --network-idle-timeout=network-idle-timeout [default: 50] Asset discovery network idle timeout (in milliseconds)
EXAMPLES
$ percy snapshot _site/
$ percy snapshot _site/ --base-url "/blog/"
$ percy snapshot _site/ --ignore-files "/blog/drafts/**"
See code: dist/commands/snapshot.ts
percy upload UPLOADDIRECTORY
Upload a directory containing static snapshot images.
USAGE
$ percy upload UPLOADDIRECTORY
ARGUMENTS
UPLOADDIRECTORY A path to the directory containing static snapshot images
OPTIONS
-c, --config=config Path to percy config file
-f, --files=files [default: **/*.png,**/*.jpg,**/*.jpeg] Glob or comma-seperated string of globs for matching the
files and directories to snapshot.
-i, --ignore=ignore Glob or comma-seperated string of globs for matching the files and directories to ignore.
EXAMPLES
$ percy upload _images/
$ percy upload _images/ --files **/*.png
See code: dist/commands/upload.ts
FAQs
An agent process for integrating with Percy.
The npm package @percy/agent receives a total of 10,464 weekly downloads. As such, @percy/agent popularity was classified as popular.
We found that @percy/agent demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 6 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.