
Security News
Risky Biz Podcast: Making Reachability Analysis Work in Real-World Codebases
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
@titicaca/eslint-config-triple
Advanced tools
npm install @titicaca/eslint-config-triple eslint --save-dev
package.json
의 scripts 속성에 다음을 추가해주세요.
{
"scripts": {
"lint:es": "eslint .",
"lint:es:fix": "eslint . --fix"
}
}
.eslintrc.js
파일을 생성하세요. 컨픽은 여러 종류로 구분되어 있어서 프로젝트에 필요한 컨픽만 이어붙어서 사용할 수 있습니다.
JavaScript, TypeScript 코드 린트 규칙을 설정하려면 다음을 추가하세요.
{
"extends": ["@titicaca/eslint-config-triple"]
}
TypeScript 코드에서 타입 정보까지 활용한 더 엄격한 규칙을 사용하려면 다음을 추가하세요. 이 컨픽도 기본적으로 사용하기를 권장합니다.
{
"extends": [
"@titicaca/eslint-config-triple",
"@titicaca/eslint-config-triple/requiring-type-checking"
]
}
React 프론트엔드 프로젝트에서는 다음을 추가하세요.
{
"extends": [
// 다른 컨픽...
"@titicaca/eslint-config-triple/frontend"
]
}
Prettier
를 사용한다면 다음을 가장 마지막에 추가하세요.
{
"extends": [
// 다른 컨픽...
"@titicaca/eslint-config-triple/prettier"
]
}
eslint의 최종 설정을 스냅샷으로 기록합니다.
pnpm run test:snapshot
새로운 rule을 추가하여 스냅샷이 깨졌다면, 스냅샷을 업데이트해주세요.
pnpm run update-snapshot
개발중 스냅샷 테스트를 계속 수행하고 싶다면, watch 옵션을 사용하세요.
pnpm run test:snapshot:watch
FAQs
Triple's ESLint config, following our styleguide.
The npm package @titicaca/eslint-config-triple receives a total of 1,176 weekly downloads. As such, @titicaca/eslint-config-triple popularity was classified as popular.
We found that @titicaca/eslint-config-triple demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 114 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.