
Security News
Risky Biz Podcast: Making Reachability Analysis Work in Real-World Codebases
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
browser-console-listener
Advanced tools
Listen for things typed in the browser console.
console.log('Do you like ice cream? (yes or no)');
var bcl = require('browser-console-listener');
var listener = bcl(window);
listener.listen(['yes', 'no'], function(selection) {
console.log('you said ' + selection + '!');
});
Create a listener for the given host object. Pass window
as host
to achieve the desired effect in browser console.
Listen for an answer.
Array of strings. A getter will be defined on host object for each answer. There cannot already be a property on host object with same name as any answer.
Function invoked when user types an answer. It is passed the selected answer (string).
Stop listening for answers. Remove getters from host object.
npm install browser-console-listener
bower install browser-console-listener
MIT
[1.0.1] - 2015-06-27
FAQs
Listen for things typed in the browser console
The npm package browser-console-listener receives a total of 1 weekly downloads. As such, browser-console-listener popularity was classified as not popular.
We found that browser-console-listener demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.