Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
@rocket.chat/ui-kit
Advanced tools
@rocket.chat/ui-kit
Interactive UI elements for Rocket.Chat Apps
Add @rocket.chat/ui-kit
as a dependency:
npm i @rocket.chat/ui-kit
# or, if you are using yarn:
yarn add @rocket.chat/ui-kit
Contributions, issues, and feature requests are welcome!
Feel free to check the issues.
As this package dependends on others in this monorepo, before anything run the following at the root directory:
yarn build
To ensure the source is matching our coding style, we perform linting. Before commiting, check if your code fits our style by running:
yarn lint
Some linter warnings and errors can be automatically fixed:
yarn lint-and-fix
Whenever possible, add tests to describe exactly what your code do. You can run them by yourself:
yarn test
FAQs
Interactive UI elements for Rocket.Chat Apps
The npm package @rocket.chat/ui-kit receives a total of 4,575 weekly downloads. As such, @rocket.chat/ui-kit popularity was classified as popular.
We found that @rocket.chat/ui-kit demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.