
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
@weh/pretty
Advanced tools
nice pretty links for weh
npm install @weh/pretty
const weh = require('@weh/weh')
const plugin = require('@weh/pretty')
// enter our main function:
// the main function should be an async function so that
// it automatically returns a promise
weh(async site => {
// we use the plugin
site.use(plugin)
// ...and initiate the build process
return site
})
By default, pretty operates on all HTML files (files that end with .html).
This can be changed easily by using a custom filter. A filter is a function that
takes a file and returns a boolean that describes whether that file should have
pretty enabled or not. A custom filter can look like this:
function myCustomFilter (file, options, files) {
return file.path.includes('my-dir/')
}
This filter only matches HTML files that are located in the my-dir directory.
To use the filter, just pass it into the plugin options:
weh(async site => {
site.use(pretty, {filter: myCustomFilter})
return site
})
MIT (see LICENSE document)
FAQs
pretty links for weh
We found that @weh/pretty demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.