Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@wordpress/dom-ready
Advanced tools
Execute callback after the DOM is loaded.
Install the module
npm install @wordpress/dom-ready --save
This package assumes that your code will run in an ES2015+ environment. If you're using an environment that has limited or no support for such language features and APIs, you should include the polyfill shipped in @wordpress/babel-preset-default
in your code.
Specify a function to execute when the DOM is fully loaded.
Usage
import domReady from '@wordpress/dom-ready';
domReady( function () {
//do something after DOM loads.
} );
Parameters
Callback
: A function to execute after the DOM is ready.Returns
void
:See https://make.wordpress.org/core/handbook/best-practices/browser-support/
This is an individual package that's part of the Gutenberg project. The project is organized as a monorepo. It's made up of multiple self-contained software packages, each with a specific purpose. The packages in this monorepo are published to npm and used by WordPress as well as other software projects.
To find out more about contributing to this package or Gutenberg as a whole, please read the project's main contributor guide.
FAQs
Execute callback after the DOM is loaded.
The npm package @wordpress/dom-ready receives a total of 75,365 weekly downloads. As such, @wordpress/dom-ready popularity was classified as popular.
We found that @wordpress/dom-ready demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.