
Security News
Risky Biz Podcast: Making Reachability Analysis Work in Real-World Codebases
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Exports bluebird Promise library v3.x.
Why on earth would you use this rather than bluebird itself? Well you probably wouldn't, and shouldn't.
Only reason is along with bluebird2 if you need to load both versions v2.x and v3.x of bluebird simultaneously, for example for running tests on a module which should work with either version.
var Bluebird2 = require('bluebird2');
var Bluebird3 = require('bluebird3');
// Now you have both. Whoopee!
Bluebird.getNewLibraryCopy()
This module adds one method to the Bluebird constructor if not present already: .getNewLibraryCopy()
.getNewLibraryCopy()
returns a new independent instance of the Bluebird constructor.
var Bluebird = require('bluebird3');
var BluebirdX = Bluebird.getNewLibraryCopy();
console.log(BluebirdX != Bluebird); // true
Bluebird.version
The module adds .version
property to the Bluebird constructor, containing the semver version of Bluebird.
var Bluebird = require('bluebird3');
console.log(Bluebird.version); // e.g. '3.3.5'
Use npm test
to run the tests. Use npm run cover
to check coverage.
See changelog.md
If you discover a bug, please raise an issue on Github. https://github.com/overlookmotel/bluebird3/issues
Pull requests are very welcome. Please:
3.1.3
bluebird
to v3.5.4FAQs
bluebird v3.x
The npm package bluebird3 receives a total of 5 weekly downloads. As such, bluebird3 popularity was classified as not popular.
We found that bluebird3 demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.