
Research
Security News
The Landscape of Malicious Open Source Packages: 2025 Mid‑Year Threat Report
A look at the top trends in how threat actors are weaponizing open source packages to deliver malware and persist across the software supply chain.
akash-jivani
Advanced tools
####Prerequisite:
Download & Install nodejs
Download & Install yarn (Depends on Node.js)
Download & Install JRE 8u201 (We have tested with 8u201, but it will probably work with others if you have a newer version.)
Setup node, yarn, & java in enviroment path
Download & Install a Code Editor. We are using VSCode
Run the following commands to set your registry to our internal artifactory server. This only needs to be done once per machine:
yarn config set registry https://artifacts.microchip.com/artifactory/api/npm/npm/
npm config set registry https://artifacts.microchip.com/artifactory/api/npm/npm/
For further information please see the Workflow
####Setup
yarn install
yarn build-run-dir
peripheral.json
in the config directory. Place a JSON object copied from the device and peripheral you wish to use for this project#####Compile & Build
yarn create-auto-module
moduleConfig.json
file and creates a set of files in the generated_module directory specific to the data in config/peripheral.json
.
-moduleConfig.json
can now be modified to customize your project.yarn build
create-auto-module
as part of the build processyarn start
#####Unit Tests
yarn test
FAQs
for tsting
The npm package akash-jivani receives a total of 2 weekly downloads. As such, akash-jivani popularity was classified as not popular.
We found that akash-jivani demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A look at the top trends in how threat actors are weaponizing open source packages to deliver malware and persist across the software supply chain.
Security News
ESLint now supports HTML linting with 48 new rules, expanding its language plugin system to cover more of the modern web development stack.
Security News
CISA is discontinuing official RSS support for KEV and cybersecurity alerts, shifting updates to email and social media, disrupting automation workflows.