Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@rheactorjs/value-objects
Advanced tools
A collection of value objects
This method exposes a tcomb type validation base on instanceof
or the name of the type and it's properties.
Note that instanceof can't be used always because having this check will return false, because the application using
the value-objects package will create an instance that Node.js thinks to be from a different location that the
one referenced in this package's uri.js
# app.js
const URIValue = require('value-objects/uri')
let u = new URIValue(…)
URIValue.Type(u) // will fail
# uri.js
URIValue.Type = t.irreducible('URIValue', (x) => x instanceof URIValue)
You can compare two value objects with the .equals()
method:
const ex = new URIValue('https://example.com')
ex.equals(new URIValue('https://example.com')) // -> true
ex.equals(new URIValue('https://acme.com')) // -> false
You can check if a given value is of this value object:
const ex = new URIValue('https://example.com')
URIValue.is(ex) // -> true
DomainValue.is(ex) // -> false
FAQs
A collection of value objects
The npm package @rheactorjs/value-objects receives a total of 1 weekly downloads. As such, @rheactorjs/value-objects popularity was classified as not popular.
We found that @rheactorjs/value-objects demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.