
Security News
gem.coop Tests Dependency Cooldowns as Package Ecosystems Move to Slow Down Attacks
gem.coop is testing registry-level dependency cooldowns to limit exposure during the brief window when malicious gems are most likely to spread.
@posthog/filter-out-plugin
Advanced tools
> Injest only those events satisfying the given filter conditions
Injest only those events satisfying the given filter conditions
The plugin configuration requires a JSON file with the following structure:
Example filters:
Only keep events where all the following conditions are met:
[
{
"key": "email",
"type": "string",
"operator": "not_contains",
"value": "yourcompany.com"
},
{
"key": "host",
"type": "string",
"operator": "is_not",
"value": "localhost:8000"
},
{
"key": "browser_version",
"type": "number",
"operator": "gt",
"value": 100
}
]
Allowed types and their operators:
| Type | Operators |
|---|---|
| number | gt, gte, lt, lte, eq, neq |
| string | is, is_not, contains, not_contains, regex, not_regex |
| boolean | is, is_not |
FAQs
> Injest only those events satisfying the given filter conditions
The npm package @posthog/filter-out-plugin receives a total of 27 weekly downloads. As such, @posthog/filter-out-plugin popularity was classified as not popular.
We found that @posthog/filter-out-plugin demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 8 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
gem.coop is testing registry-level dependency cooldowns to limit exposure during the brief window when malicious gems are most likely to spread.

Security News
Following multiple malicious extension incidents, Open VSX outlines new safeguards designed to catch risky uploads earlier.

Research
/Security News
Threat actors compromised four oorzc Open VSX extensions with more than 22,000 downloads, pushing malicious versions that install a staged loader, evade Russian-locale systems, pull C2 from Solana memos, and steal macOS credentials and wallets.