
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
A trie data structure that holds
object keys weakly, yet can also hold non-object keys, unlike WeakMap.
The trie-search package is another implementation of a trie data structure for JavaScript. It offers similar functionalities for adding and searching words in a trie. It also allows for customizing the key on which the trie is built and supports wildcard searches.
This package implements a ternary search trie, which is a type of trie that can have better performance for certain datasets or use cases. It is similar to @wry/trie in that it is used for storing strings and performing prefix searches, but the underlying data structure and performance characteristics may differ.
FAQs
https://en.wikipedia.org/wiki/Trie
The npm package @wry/trie receives a total of 1,570,026 weekly downloads. As such, @wry/trie popularity was classified as popular.
We found that @wry/trie demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.