
Security News
Feross on TBPN: How North Korea Hijacked Axios
Socket CEO Feross Aboukhadijeh breaks down how North Korea hijacked Axios and what it means for the future of software supply chain security.
@stemuli/ui
Advanced tools
Simply run the commands below and you should have a working storybook displaying all of our components.
git clone repoyarn installyarn devEach component follows the folder structure below:
Exports react component to be consumed
Showcase of component for storybook
Exports a styled component consumed by the react component
When you are ready to publish the package to NPM, use the release.prepare script:
yarn run release.prepare -m "Commit message" --patch
This script will increment the version number in package.json based on the specified version type (--patch, --minor, or --major are valid switches). The script will also check in the changes, commit the changes, and create a git tag with the new version number.
After the script runs successfully, you will need to push the tag to Github. Once the tag is pushed, Travis CI will run and publish the package to NPM. This process usually takes 1-2 minutes.
git push origin x.y.z
Where x.y.z is the new version number (part of the script output).
Notes:
patch will be used by defaultFAQs
## Getting Started
We found that @stemuli/ui demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Socket CEO Feross Aboukhadijeh breaks down how North Korea hijacked Axios and what it means for the future of software supply chain security.

Security News
OpenSSF has issued a high-severity advisory warning open source developers of an active Slack-based campaign using impersonation to deliver malware.

Research
/Security News
Malicious packages published to npm, PyPI, Go Modules, crates.io, and Packagist impersonate developer tooling to fetch staged malware, steal credentials and wallets, and enable remote access.