Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
clock-time
Advanced tools
Formats milliseconds or minutes and seconds as clock time
npm install clock-time
Import or require the package and pass milliseconds as a single argument to get nicely formatted clock time.
import clockTime from 'clock-time'; // es6
const clockTime = require('clock-time'); // cjs
clockTime(60 * 1000); // 1:00
Or, pass the number of minutes as the first argument and the number of seconds as the second argument instead.
clockTime(4, 20); // 4:20
toClockParts
Use the named export toClockParts
to convert milliseconds to an object of minutes, zero-padded seconds, and total seconds. This can be useful when you want to use the parts of a clock time separately or in addition to the formatted string.
toClockParts
also accepts an object of options as a second argument. You can disable zero-padding on the returned seconds
property by passing {noPad: true}
to the function.
import {toClockParts} from 'clock-time';
const {
minutes, // 4
seconds, // 20
total // 260
} = toClockParts(260000);
const formatted = `${minutes}:${seconds}`; // or clockTime(minutes, seconds)
FAQs
Formats milliseconds or minutes and seconds as clock time
We found that clock-time demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.