
Security News
NIST Officially Stops Enriching Most CVEs as Vulnerability Volume Skyrockets
NIST will stop enriching most CVEs under a new risk-based model, narrowing the NVD's scope as vulnerability submissions continue to surge.
@smithy/property-provider
Advanced tools
[](https://www.npmjs.com/package/@smithy/property-provider) [](https://www.npmjs.com/package/@smi
This is an internal package. That means this is used as a dependency for other, public packages, but should not be taken directly as a dependency in your application's
package.json.
If you are updating the version of this package, for example to bring in a bug-fix, you should do so by updating your application lockfile with e.g.
npm up @scope/packageor equivalent command in another package manager, rather than taking a direct dependency.
FAQs
[](https://www.npmjs.com/package/@smithy/property-provider) [](https://www.npmjs.com/package/@smi
The npm package @smithy/property-provider receives a total of 46,189,394 weekly downloads. As such, @smithy/property-provider popularity was classified as popular.
We found that @smithy/property-provider demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
NIST will stop enriching most CVEs under a new risk-based model, narrowing the NVD's scope as vulnerability submissions continue to surge.

Company News
/Security News
Socket is an initial recipient of OpenAI's Cybersecurity Grant Program, which commits $10M in API credits to defenders securing open source software.

Security News
Socket CEO Feross Aboukhadijeh joins 10 Minutes or Less, a podcast by Ali Rohde, to discuss the recent surge in open source supply chain attacks.