
Security News
MCP Community Begins Work on Official MCP Metaregistry
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
v0.2.1
Validates your bower.json file
checkbower is a small Node.js module to help you verify wether a given bower.json file is valid, containing at the very least a name and a semver valid version number.
It also runs as a small command-line tool to help you verify your bower.json file in a day-to-day basis. Ideal to integrate in a pre-commit hook.
In order to use it as a command-line tool, install it using npm:
npm install -g checkbower
The command-line tool can be used to valid the bower.json
file of the actual folder simply by running:
checkbower
Or you can also specify a path of a bower.json file to validate:
checkbower ./path/to/bower.json
The core functionality for bower.json file validation can also be used programatically on any node.js app:
var checkbower = require('checkbower');
if (checkbower('path/to/bower.json')) {
// You have a valid file
} else {
// The file is not valid
}
Released under the MIT license
FAQs
Validates your bower.json file
The npm package checkbower receives a total of 5 weekly downloads. As such, checkbower popularity was classified as not popular.
We found that checkbower demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.