Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
bpmn-i18n-moddle
Advanced tools
Read and write BPMN 2.0 diagram files with bpmn-i18n extension in NodeJS and the browser.
import BpmnModdle from 'bpmn-moddle';
import BpmnI18nSchema from 'bpmn-i18n-moddle/resources/bpmn-i18n.json';
const moddle = new BpmnModdle({ i18n: BpmnI18nSchema });
// import XML with i18n namespace
To run the test suite that includes XSD schema validation you must have a Java JDK installed and properly exposed through the JAVA_HOME
variable.
Execute the tests via:
npm test
Perform a complete build of the application via:
npm run all
Use under the terms of the MIT license.
0.1.0
FEAT
: init release :tada:FAQs
Moddle schema for bpmn-i18n
The npm package bpmn-i18n-moddle receives a total of 29 weekly downloads. As such, bpmn-i18n-moddle popularity was classified as not popular.
We found that bpmn-i18n-moddle demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.