Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
@ryersonlibrary/floorplans
Advanced tools
Ryerson floorplans, both in vector format for regular use, and in custom JSON format for use in Stencil Apps.
This project is intended to be the go-to location for anything related to building floorplans. The primary intent is for use with the Building Information System but the uses can be extended beyond that.
Floorplans are organized by building, within the masters
folder using the 3-character building code (e.g. LIB for Library). The key file for each building is the [LIB]_Master.svg
. This is a single SVG file that has a group for every
floor of the building.
Each master file for a building has the following structure requirements
Floor NN
, where NN
is a zero-padded floor number (e.g. 02
);LIB
).FAQs
Ryerson floorplans, both in vector format for regular use, and in custom JSON format for use in Stencil Apps.
The npm package @ryersonlibrary/floorplans receives a total of 1 weekly downloads. As such, @ryersonlibrary/floorplans popularity was classified as not popular.
We found that @ryersonlibrary/floorplans demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.