Security News
Cloudflare Adds Security.txt Setup Wizard
Cloudflare has launched a setup wizard allowing users to easily create and manage a security.txt file for vulnerability disclosure on their websites.
@rheactorjs/value-objects
Advanced tools
A collection of value objects
This method exposes a tcomb type validation base on instanceof
or the name of the type and it's properties.
Note that instanceof can't be used always because having this check will return false, because the application using
the value-objects package will create an instance that Node.js thinks to be from a different location that the
one referenced in this package's uri.js
# app.js
const URIValue = require('value-objects/uri')
let u = new URIValue(…)
URIValue.Type(u) // will fail
# uri.js
URIValue.Type = t.irreducible('URIValue', (x) => x instanceof URIValue)
You can compare two value objects with the .equals()
method:
const ex = new URIValue('https://example.com')
ex.equals(new URIValue('https://example.com')) // -> true
ex.equals(new URIValue('https://acme.com')) // -> false
You can check if a given value is of this value object:
const ex = new URIValue('https://example.com')
URIValue.is(ex) // -> true
DomainValue.is(ex) // -> false
FAQs
A collection of value objects
The npm package @rheactorjs/value-objects receives a total of 2 weekly downloads. As such, @rheactorjs/value-objects popularity was classified as not popular.
We found that @rheactorjs/value-objects demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Cloudflare has launched a setup wizard allowing users to easily create and manage a security.txt file for vulnerability disclosure on their websites.
Security News
The Socket Research team breaks down a malicious npm package targeting the legitimate DOMPurify library. It uses obfuscated code to hide that it is exfiltrating browser and crypto wallet data.
Security News
ENISA’s 2024 report highlights the EU’s top cybersecurity threats, including rising DDoS attacks, ransomware, supply chain vulnerabilities, and weaponized AI.