
Security News
New CNA Scorecard Tool Ranks CVE Data Quality Across the Ecosystem
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
A single method library used for cloning any sort of data structure in javascript!
// Import
const clone = require('deepClone');
let objectArray = [{ a: 0, b: 2}, { a: 3, b: 5}];
let clonedObjectArray = clone(objectArray);
objectArray[0][a] = 6;
// => [{ a: 6, b: 2}, { a: 3, b: 5}];
console.log(clonedObjectArray);
// => [{ a: 0, b: 2}, { a: 3, b: 5}]
# Clone the project locally
git clone git@github.com:joshghent/deepClone.git deepClone
# Change directory
cd deepClone
# Install dependancies
npm install
# Make your changes + add a test for the new feature or bug you found!
# then...
git add -A && git commit -m "Added an awwwwesome feature." && git push origin master
Finally submit a pull request and grab a cup of tea whilst pondering how kickass you feel to be part of the open source community!
FAQs
Deep copy library for any data structure
The npm package clonedeep receives a total of 8,118 weekly downloads. As such, clonedeep popularity was classified as popular.
We found that clonedeep demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
Research
/Security News
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.
Research
/Security News
Socket uncovered 11 malicious Go packages using obfuscated loaders to fetch and execute second-stage payloads via C2 domains.