
Research
/Security News
60 Malicious Ruby Gems Used in Targeted Credential Theft Campaign
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Write your JSON-schemas in simple chainable manner. No plain JSON - no pain.
Install it with NPM or add it to your package.json:
$ npm install ajg
Getter property that creates empty JSON-schema. This schema could be modified by rules in chainable manner:
ajg.schema.required.array.items(ajg.schema.integer)
Produces:
{
required: true,
type: 'array',
items: {
type: 'integer'
}
}
Currently Ajg supports only draft-03 rules and fully compatible with conform.js.
ajg.schema.required
-> { required: true }
ajg.schema.any
-> { type: 'any' }
ajg.schema.array
-> { type: 'array' }
ajg.schema.object
-> { type: 'object' }
ajg.schema.boolean
-> { type: 'boolean' }
ajg.schema.number
-> { type: 'number' }
ajg.schema.integer
-> { type: 'integer' }
ajg.schema.string
-> { type: 'string' }
ajg.schema.null
-> { type: 'null' }
ajg.schema.type('array')
-> { type: 'array' }
ajg.schema.message('hello')
-> { message: 'hello' }
ajg.schema.messages({ required: 'hello' })
-> { messages: { required: 'hello' } }
ajg.schema.description('hello')
-> { description: 'hello' }
ajg.schema.set('a', 'b')
-> { a: 'b' }
ajg.schema.extend({a: 'b'})
-> { a: 'b' }
ajg.schema.required.reset('required')
-> {}
ajg.schema.required.reset()
-> {}
...
Clone repository from github, cd
into cloned dir and install dev dependencies:
$ npm install
Then run tests with command:
$ npm test
FAQs
Ajg: Another JSON Schema Generator
The npm package ajg receives a total of 2 weekly downloads. As such, ajg popularity was classified as not popular.
We found that ajg demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
Research
/Security News
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.