
Research
Two Malicious Rust Crates Impersonate Popular Logger to Steal Wallet Keys
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
@procore/core-css
Advanced tools
An implementation of Procore's Web Design Guidelines.
Node 6+ NPM or Yarn
Our styles are organized according to Inverted Triangle CSS
. ITCSS organizes stylesheets by specificity. Read the article linked above for more information.
To get started, type the following from the root directory:
yarn
yarn dev
Testing currently consists of Jest snapshot testing on our React components. To run the test suite use the following command:
yarn test
yarn build
Once the project is done building, the docs can be viewed at build/docs/index.html
Bug reports and pull requests are welcome on GitHub at https://github.com/procore/core. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the Contributor Covenant code of conduct.
In lieu of a formal styleguide, we use husky to create a precommit
hook, which executes prettier on any git staged files determined by lint-staged.
The package is available under the Procore Developers License
CORE Icons is maintained by Procore Technologies.
Procore - building the software that builds the world.
Learn more about the #1 most widely used construction management software at procore.com
FAQs
The building blocks of the Procore universe.
We found that @procore/core-css demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 118 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.