
Research
NPM targeted by malware campaign mimicking familiar library names
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
@vincjo/datatables
Advanced tools
A powerful toolkit for building datatable components.
Streamline your data workflow with a robust API providing advanced features while reducing code complexity.
:globe_with_meridians: vincjo.fr/datatables
npm i -D @vincjo/datatables
In order to make the migration process a little easier, v1 is embed in “legacy” namespace so you will have the opportunity to upgrade your components progressively by simply modifying imports.
- @vincjo/datatables
+ @vincjo/datatables/legacy
- @vincjo/datatables/remote
+ @vincjo/datatables/legacy/remote
<script lang="ts">
import { TableHandler } from '@vincjo/datatables'
import { someData } from './data'
const table = new TableHandler(someData, { rowsPerPage: 50 })
</script>
<table>
<thead>
<tr>
<th>First name</th>
<th>Last name</th>
</tr>
</thead>
<tbody>
{#each table.rows as row}
<tr>
<td>{row.first_name}</td>
<td>{row.last_name}</td>
</tr>
{/each}
</tbody>
</table>
FAQs
A powerful toolkit for building datatable components
We found that @vincjo/datatables demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
Research
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.