
Research
NPM targeted by malware campaign mimicking familiar library names
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
@runner/core
Advanced tools
npm install @runner/core
Add to the scope:
var runner = require('@runner/core');
Create a simple task:
runner.task('make', function () {
// some actions
});
More examples of tasks creation and execution are available in the @cjssdk/runner package.
Add an alias to an existing task:
runner.alias('build', 'make');
Run task on a key or keys combination press:
runner.keystroke('build', 'ctrl+b');
To execute a specific task on some file changes:
runner.watch('src/script/**/*.js', 'webpack:build');
To execute a named or anonymous function:
runner.watch('src/script/**/*.js', function rebuild ( done ) {
// function name "rebuild" is used as task name
// otherwise <noname> is printed
done();
});
To execute task series:
runner.watch('src/script/**/*.js', runner.serial('lint', 'build'));
Before calling runner.watch
it's possible to configure the watch:
runner.watch.config = {
// some configuration
};
All available configurations you can see in the underlying chokidar package.
If you have any problems or suggestions please open an issue according to the contribution rules.
@runner/core
is released under the GPL-3.0 License.
FAQs
Simple task runner core.
We found that @runner/core demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
Research
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.