Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
babylonjs-inspector
Advanced tools
For usage documentation please visit https://doc.babylonjs.com/how_to/debug_layer.
The inspector will be automatically (async) loaded when starting the debug layer, if not already included. So technically, nothing needs to be done!
If you wish however to use a different version of the inspector or host it on your own, follow these instructions:
⚠️ WARNING: The CDN should not be used in production environments. The purpose of our CDN is to serve Babylon packages to users learning how to use the platform or running small experiments. Once you've built an application and are ready to share it with the world at large, you should serve all packages from your own CDN.
The latest compiled js file is offered on our public CDN here:
To install using npm :
npm install --save babylonjs babylonjs-inspector
Afterwards it can be imported to the project using:
import * as BABYLON from 'babylonjs';
import 'babylonjs-inspector';
This will create a global INSPECTOR variable that will be used bay BabylonJS
Webpack is supported.
7.35.0
FAQs
Babylon.js inspector module =====================
The npm package babylonjs-inspector receives a total of 1,294 weekly downloads. As such, babylonjs-inspector popularity was classified as popular.
We found that babylonjs-inspector demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.