Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Configure async validation mode in Ajv - JSON-Schema validator
npm install ajv-async
The code below configures async mode in Ajv instance to use the best async mode (async functions or generators) available in the current environment with/without transpilation. If transpilation is required, you should install nodent or regenerator, ajv-async doesn't install them.
var Ajv = require('ajv');
var setupAsync = require('ajv-async');
var ajv = setupAsync(new Ajv);
async
and/or transpile
options can be passed to Ajv to enable a specific async/transpilation mode. See Ajv docs for more information.
At the moment Ajv already includes nodent and regenerators bundles. You still need to use this package, unless you manually set async
option and explicitely pass processCode
option. transpile
option support requires using this package.
If you build this package with your code with Webpack, it will log warnings because this package uses optional dependencies. To suppress these warnings use IgnorePlugin:
new IgnorePlugin(/regenerator|nodent/, /ajv-async/)
FAQs
Configure async validation mode in Ajv - JSON-Schema validator
The npm package ajv-async receives a total of 328 weekly downloads. As such, ajv-async popularity was classified as not popular.
We found that ajv-async demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.