Product
Socket Now Supports uv.lock Files
Socket now supports uv.lock files to ensure consistent, secure dependency resolution for Python projects and enhance supply chain security.
@tibco-tcstk/tc-core-lib
Advanced tools
TCSTK Library that contains core capabilties for your TIBCO Cloud Starter
#TIBCO Cloud™ Starters Toolkit - Core Library Powered by TIBCO Labs
The core library contains the core capabilties required for any cloud starter application.
The other TCSTK libraries will be dependant on this library. This library does not depend on other TCSTK libraries to avoid circular dependencies.
Copyright © 2019. TIBCO Software Inc. This file is subject to the license terms contained in the license file that is distributed with this library or can be found here:
https://github.com/TIBCOSoftware/TCSTK-Angular/blob/master/license.txt
FAQs
TIBCO Cloud Composer Library that contains core capabilities for your TIBCO Cloud Application
The npm package @tibco-tcstk/tc-core-lib receives a total of 5 weekly downloads. As such, @tibco-tcstk/tc-core-lib popularity was classified as not popular.
We found that @tibco-tcstk/tc-core-lib demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket now supports uv.lock files to ensure consistent, secure dependency resolution for Python projects and enhance supply chain security.
Research
Security News
Socket researchers have discovered multiple malicious npm packages targeting Solana private keys, abusing Gmail to exfiltrate the data and drain Solana wallets.
Security News
PEP 770 proposes adding SBOM support to Python packages to improve transparency and catch hidden non-Python dependencies that security tools often miss.