
Security News
PodRocket Podcast: Inside the Recent npm Supply Chain Attacks
Socket CEO Feross Aboukhadijeh discusses the recent npm supply chain attacks on PodRocket, covering novel attack vectors and how developers can protect themselves.
@spotify/tsconfig
Advanced tools
Check out our docs on GitHub.
A collection of different base tsconfig.json
to be extended from in your project.
This project aims to reduce per-project configuration as much as possible. With good defaults, we can focus on building, not configuration!
Using npm or yarn:
yarn add --dev @spotify/tsconfig
For more information, check out our docs on GitHub.
Try to optimize for the fewest specified options between the config specializations. For example, only app
has noEmit: true
, since the default value, false
, is good for the lib
config. Specifying it only in the app
config means fewer overall entries!
We want to keep maintenance low by only specifying what is necessary. If the option's default value is good for every config, remove it from every config!
FAQs
Common tsconfigs to be used as your base configurations
We found that @spotify/tsconfig demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Socket CEO Feross Aboukhadijeh discusses the recent npm supply chain attacks on PodRocket, covering novel attack vectors and how developers can protect themselves.
Security News
Maintainers back GitHub’s npm security overhaul but raise concerns about CI/CD workflows, enterprise support, and token management.
Product
Socket Firewall is a free tool that blocks malicious packages at install time, giving developers proactive protection against rising supply chain attacks.