
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
@suporka/keybind
Advanced tools
Shortcut key combination library, make your keyboard key combination as easy to use as a publish-subscriber, subscribe and unsubscribe anywhere
快捷键组合库,让你的键盘组合键像发布订阅器一样简单使用,随处订阅和取消订阅
npm i @suporka/keybind --save
import keybind from '@suporka/keybind'
// bind one
keybind.bind('ctrl + s', function(event) {
// do what you want to do
}, context)
// bind more
keybind.bind(['ctrl + s', 'shift + s'], function(event) {
event.preventDefault()
event.stopPropagation()
// do what you want to do
}, context)
// unbind all
keybind.unbind('ctrl + s')
// unbind one by callback
keybind.unbind('ctrl + s', callback, context)
keybind.bind('ctrl + s', function(event) {
event.preventDefault()
event.stopPropagation()
// do what you want to do
}, context)
modifiers shift, ctrl, alt
letters a to z
numbers 0 to 9
functions f1 to f12
arrows left, up, right, down
ohter enter, esc, space, backspace, del, tab, pageup, pagedown, home, end, capslock, shift, ctrl, alt, ins
shiftkey ~ ! @ # $ % ^ & * ( ) _ + : " < > ? |
If you have some question or advise, you can send me a E-mail,or create a issue.
FAQs
We found that @suporka/keybind demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.