Security News
CISA Brings KEV Data to GitHub
CISA's KEV data is now on GitHub, offering easier access, API integration, commit history tracking, and automated updates for security teams and researchers.
@smui/touch-target
Advanced tools
A touch target is the area that extends beyond the visible boundary of an interactive element that still responds to touch inputs. According to the Material Design spec, touch targets should be no less than 48px x 48px in size. SMUI provides a touch
prop on the following components that will increased their touch target.
This component provides a wrapper to ensure that collapsing margins don't cause touch targets to overlap.
npm install --save-dev @smui/touch-target
https://sveltematerialui.com/demo/touch-target
A fragment used as a touch target wrapper.
Equivalent to the ClassAdder
with Div
common component.
See Layout and typography in the Material design spec.
See Touch Target in MDC-Web for information about the upstream library's architecture.
7.0.0-beta.0 (2022-10-12)
FAQs
Svelte Material UI - Touch Target
The npm package @smui/touch-target receives a total of 1,571 weekly downloads. As such, @smui/touch-target popularity was classified as popular.
We found that @smui/touch-target demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
CISA's KEV data is now on GitHub, offering easier access, API integration, commit history tracking, and automated updates for security teams and researchers.
Security News
Opengrep forks Semgrep to preserve open source SAST in response to controversial licensing changes.
Security News
Critics call the Node.js EOL CVE a misuse of the system, sparking debate over CVE standards and the growing noise in vulnerability databases.