
Research
Security News
The Growing Risk of Malicious Browser Extensions
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
array-includes-x
Advanced tools
Supply Chain Security
Vulnerability
Quality
Maintenance
License
Determines whether an array includes a certain element.
module.exports
⇒ boolean
⏏This method determines whether an array includes a certain element, returning true or false as appropriate.
Kind: Exported member
Returns: boolean
- true
if searched element is included; otherwise false
.
Throws:
TypeError
If array
is null
or undefined
.Param | Type | Description |
---|---|---|
array | Array | The array to search. |
searchElement | * | Element to locate in the array . |
[fromIndex] | number | The position in this array at which to begin searching for searchElement. A negative value searches from the index of array.length + fromIndex by asc. Defaults to 0. |
Example
import includes from 'array-includes-x';
const subject = [2, 3, undefined, true, 'hej', null, 2, false, 0, -0, NaN];
console.log(includes(subject, undefined)); // true
console.log(includes(subject, undefined, 3)); // false
console.log(includes(subject, NaN)); // true
console.log(includes(subject, 10)); // false
FAQs
Determines whether an array includes a certain element.
The npm package array-includes-x receives a total of 163 weekly downloads. As such, array-includes-x popularity was classified as not popular.
We found that array-includes-x demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
Research
Security News
An in-depth analysis of credential stealers, crypto drainers, cryptojackers, and clipboard hijackers abusing open source package registries to compromise Web3 development environments.
Security News
pnpm 10.12.1 introduces a global virtual store for faster installs and new options for managing dependencies with version catalogs.