
Product
Introducing Socket Firewall: Free, Proactive Protection for Your Software Supply Chain
Socket Firewall is a free tool that blocks malicious packages at install time, giving developers proactive protection against rising supply chain attacks.
@sablier/v2-periphery
Advanced tools
This repository contains the peripheral smart contracts of the Sablier V2 Protocol. For lower-level logic, see the sablier-labs/v2-core repository.
In-depth documentation is available at docs.sablier.com.
First, run the install step:
forge install sablier-labs/v2-periphery
Then, add the following line to your remappings.txt
file:
@sablier/v2-periphery/=lib/v2-periphery/src/
Sablier V2 Periphery is available as a Node.js package:
pnpm add @sablier/v2-periphery
Please refer to the SECURITY policy for any security-related concerns. This repository is subject to a bug bounty program per the terms outlined in the aforementioned policy.
Sablier V2 Periphery is licensed under GPL v3 or later, except for most of the files in test/
, which
remain unlicensed (as indicated in their SPDX headers).
FAQs
Peripheral smart contracts for interacting with Sablier V2
The npm package @sablier/v2-periphery receives a total of 23 weekly downloads. As such, @sablier/v2-periphery popularity was classified as not popular.
We found that @sablier/v2-periphery demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket Firewall is a free tool that blocks malicious packages at install time, giving developers proactive protection against rising supply chain attacks.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.