
Company News
/Security News
Socket Selected for OpenAI's Cybersecurity Grant Program
Socket is an initial recipient of OpenAI's Cybersecurity Grant Program, which commits $10M in API credits to defenders securing open source software.
cloudify-blueprint-topology
Advanced tools
Blueprint topology front end library, used by Cloudify Stage and Cloudify Blueprint Composer.
Project requires NodeJS >= 16.13.1.
To download project dependencies you need to run:
npm install
To create topology bundle package run:
npm run build
To run development server with usage examples use the following command:
npm run devServer
Development server will be started at http://localhost:29000.
See docs/README.md.
Cloudify Blueprint Topology library is published in NPM registry. See cloudify-blueprint-topology@npm.
Cloudify Blueprint Topology uses the same mechanism as Cloudify UI Common repository for publishing. Check Publishing section @ cloudify-ui-common for details.
FAQs
Cloudify Blueprint Topology library
The npm package cloudify-blueprint-topology receives a total of 36 weekly downloads. As such, cloudify-blueprint-topology popularity was classified as not popular.
We found that cloudify-blueprint-topology demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Company News
/Security News
Socket is an initial recipient of OpenAI's Cybersecurity Grant Program, which commits $10M in API credits to defenders securing open source software.

Security News
Socket CEO Feross Aboukhadijeh joins 10 Minutes or Less, a podcast by Ali Rohde, to discuss the recent surge in open source supply chain attacks.

Research
/Security News
Campaign of 108 extensions harvests identities, steals sessions, and adds backdoors to browsers, all tied to the same C2 infrastructure.