Security News
Supply Chain Attack Detected in @solana/web3.js Library
A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular @solana/web3.js library.
@tabler/icons-pdf
Advanced tools
A set of free MIT-licensed high-quality SVG icons for you to use in your web projects.
A set of 5736 free MIT-licensed high-quality SVG icons for you to use in your web projects. Each icon is designed on a 24x24 grid and a 2px stroke.
Browse all icons at tabler-icons.io →
If you want to support my project and help me grow it, you can become a sponsor on GitHub or just donate on PayPal :)
yarn add @tabler/icons-pdf
or
npm install @tabler/icons-pdf
or
pnpm install @tabler/icons-pdf
or just download from Github.
All PDF files are stored in icons
subdirectory.
For more info on how to contribute please see the contribution guidelines.
Caught a mistake or want to contribute to the documentation? Edit this page on Github
Tabler Icons is licensed under the MIT License.
FAQs
A set of free MIT-licensed high-quality SVG icons for you to use in your web projects.
The npm package @tabler/icons-pdf receives a total of 199 weekly downloads. As such, @tabler/icons-pdf popularity was classified as not popular.
We found that @tabler/icons-pdf demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular @solana/web3.js library.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.