
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
@woftis/linked-list
Advanced tools
Methods | Description |
---|---|
size | Return the current list size |
head | Return the current head object |
tail | Return the tail (last) object |
toString | Return list of objects as a string in format ( value ) -> ( value ) -> ( value ) -> null |
at(index) | Return the object at a given index of the list |
appendNode(value) | Add a new item at the end of the list. Accepts the value of the node you want to add |
prependNode(value) | Add a new item at the start of the list (replacing the head). Accepts the value of the node you want to add |
pop | Remove the last item from the list |
contains(value) | Returns true if the list contains the passed value, else returns false |
find(value) | Returns the index number of the value if the list contains the passed value, else returns null |
insertAt(index, value) | Adds value to the specified index position of the list. If 0 is provided, it will prepend to the head, if index is greater than list size it will append to the tail |
removeAt(index) | Removes value from the specified index position of the list. If 0 is provided, it will remove the head, if index is greater than list size it will return null |
FAQs
A JS implementation of linked lists
The npm package @woftis/linked-list receives a total of 0 weekly downloads. As such, @woftis/linked-list popularity was classified as not popular.
We found that @woftis/linked-list demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.