Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
"Open source cloud & desktop IDE."
Codebox is a complete and modular Cloud IDE. It can run on any unix-like machine (Linux, Mac OS X). It is an open source component of codebox.io (Cloud IDE as a Service).
The IDE can run on your desktop (Linux or Mac), on your server or the cloud. You can use the codebox.io service to host and manage IDE instances.
Codebox is built with web technologies: node.js
, javascript
, html
and less
. The IDE possesses a very modular and extensible architecture, that allows you to build your own features with through add-ons. Codebox is the first open and modular IDE capable of running both on the Desktop and in the cloud (with offline support).
Install Codebox globally using NPM:
npm install -g codebox
Run Codebox with:
codebox run ./myworkspace
Get help and list of commands with:
codebox --help
Follow updates about Codebox on Twitter and Youtube.
The IDE's documentation can be found in the docs folder. Feel free to ask any questions or signal problems by adding issues.
Codebox accepts pull-requests, please see the Contributing to Codebox guide for information on contributing to this project
Screencast: A screencast of the IDE is available on Youtube.
The project is open source under the Apache 2.0 license.
FAQs
Open source cloud & desktop IDE.
The npm package codebox receives a total of 1 weekly downloads. As such, codebox popularity was classified as not popular.
We found that codebox demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.