Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
@rocket.chat/ui-kit
Advanced tools
@rocket.chat/ui-kit
Interactive UI elements for Rocket.Chat Apps
Add @rocket.chat/ui-kit
as a dependency:
npm i @rocket.chat/ui-kit
# or, if you are using yarn:
yarn add @rocket.chat/ui-kit
Contributions, issues, and feature requests are welcome!
Feel free to check the issues.
As this package dependends on others in this monorepo, before anything run the following at the root directory:
yarn build
To ensure the source is matching our coding style, we perform linting. Before commiting, check if your code fits our style by running:
yarn lint
Some linter warnings and errors can be automatically fixed:
yarn lint-and-fix
Whenever possible, add tests to describe exactly what your code do. You can run them by yourself:
yarn test
FAQs
Interactive UI elements for Rocket.Chat Apps
The npm package @rocket.chat/ui-kit receives a total of 3,524 weekly downloads. As such, @rocket.chat/ui-kit popularity was classified as popular.
We found that @rocket.chat/ui-kit demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.