Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
assign-deep
Advanced tools
Deeply assign the enumerable properties and/or es6 Symbol properies of source objects to the target (first) object.
Deeply assign the enumerable properties and/or es6 Symbol properies of source objects to the target (first) object.
Install with npm
$ npm i assign-deep --save
var assign = require('assign-deep');
var one = {b: {c: {d: 'e'}}};
var two = {b: {c: {f: 'g', j: 'i'}}};
var three = {foo: 'bar'};
assign(one, two, three);
//=> {b: {c: {d: 'e', f: 'g', j: 'i'}}, foo: 'bar'}
Install dev dependencies:
$ npm i -d && npm test
Pull requests and stars are always welcome. For bugs and feature requests, please create an issue.
Jon Schlinkert
Copyright © 2015 Jon Schlinkert Released under the MIT license.
This file was generated by verb-cli on November 06, 2015.
FAQs
Deeply assign the values of all enumerable-own-properties and symbols from one or more source objects to a target object. Returns the target object.
The npm package assign-deep receives a total of 47,827 weekly downloads. As such, assign-deep popularity was classified as popular.
We found that assign-deep demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.