Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@thi.ng/dcons
Advanced tools
Double-linked lists with comprehensive set of operations (incl. optional self-organizing behaviors)
[!NOTE] This is one of 198 standalone projects, maintained as part of the @thi.ng/umbrella monorepo and anti-framework.
🚀 Please help me to work full-time on these projects by sponsoring me on GitHub. Thank you! ❤️
Double-linked lists with comprehensive set of operations (incl. optional self-organizing behaviors).
release()
(emptying, GC friendly)concat()
/ into()
map()
/ filter()
/ reduce()
compare()
/ equiv()
toJSON()
transform (-> array)v2.3.0 adds the self-organizing
list type SOL
(an
extension of DCons
), which dynamically re-orders items based on certain
accesses and offers these two built-in strategies:
defMTF()
- moves currently accessed element to front of listdefTranspose()
- swaps currently accessed element with its predecessorOnly the following operations will trigger the self-organizing behavior:
nth()
setNth()
setTail()
find()
findWith()
Btw. Also see
@thi.ng/cache
for more LRU, MRU implementations based on managed DCons
impls...
STABLE - used in production
Search or submit any issues for this package
yarn add @thi.ng/dcons
ESM import:
import * as dcons from "@thi.ng/dcons";
Browser ESM import:
<script type="module" src="https://esm.run/@thi.ng/dcons"></script>
For Node.js REPL:
const dcons = await import("@thi.ng/dcons");
Package sizes (brotli'd, pre-treeshake): ESM: 2.55 KB
Note: @thi.ng/api is in most cases a type-only import (not used at runtime)
cons()
first()
drop()
setHead()
into()
push()
peek()
pop()
setTail()
.length
nth()
nthCell()
setNth()
insertBefore()
insertAfter()
insertBeforeNth()
insertAfterNth()
insertSorted()
find()
findWith()
copy()
concat()
slice()
splice()
swap()
shuffle()
sort()
reverse()
rotateLeft()
rotateRight()
release()
TODO
If this project contributes to an academic publication, please cite it as:
@misc{thing-dcons,
title = "@thi.ng/dcons",
author = "Karsten Schmidt",
note = "https://thi.ng/dcons",
year = 2017
}
© 2017 - 2024 Karsten Schmidt // Apache License 2.0
FAQs
Double-linked lists with comprehensive set of operations (incl. optional self-organizing behaviors)
The npm package @thi.ng/dcons receives a total of 3,132 weekly downloads. As such, @thi.ng/dcons popularity was classified as popular.
We found that @thi.ng/dcons demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.