
Research
Two Malicious Rust Crates Impersonate Popular Logger to Steal Wallet Keys
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
@wolox/eslint-config-react
Advanced tools
Wolox's default ESLint React configuration
We use eslint as our linter and prettier as our code formatter
Also, this configuration relies on some peer dependencies you must add in your project as dev dependencies:
Make sure you check that the version you install in your project matches the one in this configuration's package.json
To use this config, make your eslint config extend from this configuration:
{
// In case you want to use more than one config, you can compose it
// using an array of configurations instead of this string
"extends": "@wolox/eslint-config-react",
"rules": {
// You can override any rule here.
}
}
Note that we use this configuration with @wolox/eslint-config. Although it is recommended to do so, it's not mandatory.
FAQs
Wolox's ESLint configuration for React projects
The npm package @wolox/eslint-config-react receives a total of 1 weekly downloads. As such, @wolox/eslint-config-react popularity was classified as not popular.
We found that @wolox/eslint-config-react demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.