
Product
Reachability for Ruby Now in Beta
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.
@symbo.ls/colorthief
Advanced tools
Grab the color palette from an image using just Javascript.Works in the browser and in Node.
build/ - Simple script that copies and renames files into the /dist folder.cypress/ - Browsers tests.dist/ - Generated distribution files created by microbundle package and a couple of files copied via build script.examples/ - CSS, JS, and Images for the index.html example page.src/color-thief-node.js - Source for the Node (commonjs) compatible version of the script.src/color-thief.js - Source for the browser (ES6, AMD, Global var) compatible version of the script.src/core.js - Functions shared between the node and browser versions of the script.test/ - Node integration tests. Uses Chai.index.html - Example page.There are two sets of tests:
To run both the browser and Node tests:
npm run dev to start local server.npm run testTo run just the browser tests with the Cypress UI:
npm run dev to start local servernpm run test:browserTo run just the Node tests:
npm run test:nodecypress/test-pages/index.html as needed or create a new test page if you need new examples.cypress/integration/apis_spec.jsdev into mastermastersrc/color-thief.js and package.jsonnpm run buildmasterv2.8.1npm publishFAQs
Get the dominant color or color palette from an image.
We found that @symbo.ls/colorthief demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 7 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.