
Research
/Security News
60 Malicious Ruby Gems Used in Targeted Credential Theft Campaign
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
@rushstack/eslint-bulk
Advanced tools
Roll out new ESLint rules in a large monorepo without cluttering up your code with "eslint-ignore-next-line"
This package provides the command-line interface (CLI) for the ESLint bulk suppressions
feature from @rushstack/eslint-patch
.
👉 Before using this tool, you will first need to install and configure the @rushstack/eslint-patch package.
See the eslint-bulk-suppressions documentation for details.
main
branch, which is in a clean state where ESLint reports no violations.eslint-bulk suppress --all ./src
to update .eslint-bulk-suppressions.json.eslint-bulk prune
periodically to find and remove unnecessary suppressions from .eslint-bulk-suppressions.json, ensuring that new violations will now get caught in those scopes.eslint-bulk suppress --rule NAME1 [--rule NAME2...] PATH1 [PATH2...]
eslint-bulk suppress --all PATH1 [PATH2...]
Use this command to automatically generate bulk suppressions for the specified lint rules and file paths.
The path argument is a glob pattern with the same syntax
as path arguments for the eslint
command.
Use this command to automatically delete all unnecessary suppression entries in all .eslint-bulk-suppressions.json files under the current working directory.
eslint-bulk prune
CHANGELOG.md - Find out what's new in the latest version
@rushstack/eslint-patch
required companion package
@rushstack/eslint-bulk
is part of the Rush Stack family of projects.
FAQs
Roll out new ESLint rules in a large monorepo without cluttering up your code with "eslint-ignore-next-line"
We found that @rushstack/eslint-bulk demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
Research
/Security News
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.