
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
@webscopeio/eslint-config
Advanced tools
ESLint config package according to Webscope guidelines.
Webscope's ESLint plugin is based on Prettier.
The result set of rules is then further extended by Webscope's custom rules.
You can find all the info you need in index.js
.
npm install @webscopeio/eslint-config --save-dev
.eslintrc
file:extends: [
'@webscopeio/eslint-config',
...
],
Configs do not ship dependencies. You'll have to install all the necessary dev dependencies on the level of your project. You can do it all at once by running this command:
npm install eslint-plugin-import eslint-plugin-jest eslint-plugin-jsx-a11y eslint-plugin-react eslint-plugin-react-hooks --save-dev
The dependencies are:
Definition for rule RULE_NAME was not found ..
, then your associated plugin does not contain RULE_NAME. To resolve this, try bumping the plugin version.For Webscope employees.
npm whoami
. The command should return your NPM name. If it does not then it is either because you are not logged in (in this case run npm login
), or because you are not registered (create new NPM account by npm adduser
or via NPM website)..github/CODEOWNERS.md
) added your NPM account to the Webscope organization.npm version <update_type>
. E.g. npm run minor
. Reach out to the code-owners if you're not sure about the version update.npm publish
.FAQs
ESLint config package according to the Webscope guidelines.
We found that @webscopeio/eslint-config demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 6 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.