
Security News
OpenGrep Restores Fingerprinting in JSON and SARIF Outputs
OpenGrep has restored fingerprint and metavariable support in JSON and SARIF outputs, making static analysis more effective for CI/CD security automation.
@travetto/compiler
Advanced tools
Node-integration of Typescript Compiler with advanced functionality for collecting AST transformers, and detecting changes in classes and methods.
Install: primary
$ npm install @travetto/compiler
This module expands upon typescript
, with supplemental functionality:
tsconfig.json
from the project directory to provideTypeChecker
es2015
Proxy
s to allow for swapping out implementation at runtimeAdditionally, there is support for common AST transformation patterns to facilitate all the transformers used throughout the framework.
Transformations are defined by support/transformer.<name>.ts
as the filename. The schema for a transformer is:
Code: Sample transformer, registration and execution
export class CustomerTransformer {
after: ['base'],
phase: 'before'|'after', // The phase as defined by Typescript's AST processing
transformer: (context: ts.TransformationContext) => {
return (file: ts.SourceFile) => {
... modify source file ...
return file;
}
}
}
FAQs
The compiler infrastructure for the Travetto framework
The npm package @travetto/compiler receives a total of 3 weekly downloads. As such, @travetto/compiler popularity was classified as not popular.
We found that @travetto/compiler demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
OpenGrep has restored fingerprint and metavariable support in JSON and SARIF outputs, making static analysis more effective for CI/CD security automation.
Security News
Security experts warn that recent classification changes obscure the true scope of the NVD backlog as CVE volume hits all-time highs.
Security Fundamentals
Attackers use obfuscation to hide malware in open source packages. Learn how to spot these techniques across npm, PyPI, Maven, and more.