
Research
/Security News
Trivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets
Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.
@tiptap/extension-document
Advanced tools
Tiptap is a headless wrapper around ProseMirror – a toolkit for building rich text WYSIWYG editors, which is already in use at many well-known companies such as New York Times, The Guardian or Atlassian.
Documentation can be found on the Tiptap website.
Tiptap is open sourced software licensed under the MIT license.
ProseMirror is a toolkit for building rich-text editors on the web. The prosemirror-model package provides a way to define document schemas, similar to @tiptap/extension-document. However, ProseMirror is more low-level and requires more configuration compared to Tiptap.
Slate is another framework for building rich-text editors. It provides a more flexible and customizable approach to defining document structures and content. While Slate offers more control, it also requires more setup and understanding of its API compared to Tiptap.
FAQs
document extension for tiptap
The npm package @tiptap/extension-document receives a total of 2,285,146 weekly downloads. As such, @tiptap/extension-document popularity was classified as popular.
We found that @tiptap/extension-document demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 6 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
/Security News
Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.

Security News
ENISA’s new package manager advisory outlines the dependency security practices companies will need to demonstrate as the EU’s Cyber Resilience Act begins enforcing software supply chain requirements.

Research
/Security News
We identified over 20 additional malicious extensions, along with over 20 related sleeper extensions, some of which have already been weaponized.