
Security News
Risky Biz Podcast: Making Reachability Analysis Work in Real-World Codebases
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
@politico/interactive-bin
Advanced tools
JS Utilities used in the creation and distribution of interactive news at POLITICO.
JS Utilities used in the creation and distribution of interactive news at POLITICO.
Installation:
$ npm install -g @politico/interactive-bin
One-Time Setup (if you work at POLITICO, check out the POLITICO Onboarding Guide):
$ pib setup
Then you can use its commands by running:
$ pib <command> <...arguments>
To start a new interactive, make an empty directory.
$ mkdir MY_INTERACTIVE_NAME
$ cd MY_INTERACTIVE_NAME
Then run the new project command:
$ pib new project
Once you have pib
installed you can access the CLI's many commands. Check out those docs for more on what they are and how to use them.
For the most part, the PIB CLI should only be used to create new projects. Once inside a PIB-made interactive you should switch to using the yarn
commands that come with those PIB projects. This will ensure that all the files and folder paths are processed correctly.
For example,
✅ yarn api new
✅ yarn new page
✅ yarn pub
❌ pib api new
❌ pib new page
❌ pib publish
PIB has some (many) opinions on how to structure your projects. These are somewhat enforced with your starting template, but you can check out the projects docs for more.
FAQs
JS Utilities used in the creation and distribution of interactive news at POLITICO.
The npm package @politico/interactive-bin receives a total of 112 weekly downloads. As such, @politico/interactive-bin popularity was classified as not popular.
We found that @politico/interactive-bin demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 11 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.