Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
[![Build Status](https://travis-ci.org/bpmn-io/bpmnlint.svg?branch=master)](https://travis-ci.org/bpmn-io/bpmnlint)
Validate your BPMN diagrams based on configurable lint rules.
Install the utility via npm and validate your diagrams via the commandline:
> bpmnlint diagram.bpmn
rule: bpmnlint/label-required
error: sid-E391B624-F6E8-428B-9C3E-7026F85C4F24 is missing label/name
error: sid-3E1FA189-AC8C-4CF1-9057-3D2EF8C6D3AF is missing label/name
error: sid-DD0BC4E1-4AA3-4835-A477-373EA263A593 is missing label/name
error: sid-B8B18E3A-EF8D-4D19-B5CD-C666D39E2E0D is missing label/name
error: sid-994BB7B0-64D8-4DC4-B549-0758628F5A16 is missing label/name
rule: bpmnlint/no-gateway-join-fork
warn: sid-545B3227-D12A-43A8-B746-55E8C75F3A8A forks and joins
warn: sid-AB73793C-D47A-4738-B34F-A82C6219A92C forks and joins
found 10 errors and 2 warnings
Checkout the ./rules
folder for the list of existing rules.
Create a .bpmnlintrc
file in your working directory and inherit from a common configuration using the extends
block:
{
"extends": "bpmnlint:recommended"
}
Add or customize rules using the rules
block:
{
"extends": "bpmnlint:recommended",
"rules": {
"bpmnlint/label-required": "off"
}
}
Checkout bpmnlint-plugin-example to learn how to define and consume custom lint rules.
Integrate the linter via bpmn-js-bpmnlint into your next BPMN editor.
MIT
3.3.1
FIX
: handle empty flow element containers in rulesFAQs
Validate your BPMN diagrams based on configurable lint rules
We found that bpmnlint demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.