
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
@re-space/cli
Advanced tools
Project uses git submodules
Re-space includes the following features:
It uses CLI, which does what you exactly need to write react applications. Currently, the solution is fully customizable. Future design implementation will be revised.
The primary motivation was not to be tied to existing solutions of vendors, so as not to get into vendor lock.
Nevertheless, I recommend considering alternative solutions:
I will explain in more detail later why these solutions did not fit perfectly into the business problems I encountered
The base implementation is ready for use.
Nevertheless, I would also like to finish some essential changes in the re-space/cli that will help show off the full power of this implementation.
Namely, it is necessary to complete the CLI, which generates a completely basic boilerplate of the main application (repository/module), which is the workspace root of the whole project.
Even in its raw form, it is already ready for use, and here is what exactly you can do with re-space:
The following options are now available:
It planned to add the following options soon:
This project is MIT licensed.
Contributions are welcome. For significant changes, please open an issue first to discuss what you would like to change.
If you made a PR, make sure to update tests as appropriate and keep the examples consistent.
FAQs
React workspaces implementation
The npm package @re-space/cli receives a total of 0 weekly downloads. As such, @re-space/cli popularity was classified as not popular.
We found that @re-space/cli demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.