Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Simple tool for declarative binding applications to HTML nodes.
$ npm install bazooka
Bazooka uses MutationObserver to watch for DOM updates. If you want to use Baz.watch()
and need to support browsers without MutationObserver, you'll need any MutationObserver polyfill (we recommend this one)
To view the examples, clone the bazooka repo, install the dependencies and compile examples:
$ git clone git://github.com/seedofjoy/bazooka.git
$ cd bazooka
$ npm install
$ npm run examples
Then run whichever example you want by opening index.html in /examples/
subdirectories:
$ cd examples
To run the test suite, first install the dependencies, then run npm test
:
$ npm install
$ npm test
Bazooka uses prettier linter. To conform with it, just run before creating a commit:
$ npm run fmt
FAQs
Simple tool for declarative binding applications to HTML nodes.
The npm package bazooka receives a total of 364 weekly downloads. As such, bazooka popularity was classified as not popular.
We found that bazooka demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.