
Product
Announcing Socket Fix 2.0
Socket Fix 2.0 brings targeted CVE remediation, smarter upgrade planning, and broader ecosystem support to help developers get to zero alerts.
Generate frightening and very believable conspiracy theories.
Current Version: 1.1.0
Node Support: 0.10.x, 0.11.x
License: MIT
Build Status:
Install Conspire with npm:
npm install conspire
If you just want to use the command-line tool, you might want to install globally:
npm install -g conspire
conspire # The Queen's diamond jubilee never actually happened. It was faked by News International.
var conspire = require('conspire');
var theory = conspire();
console.log(theory); // CERN have been using dolphins for arms trafficking since the 1970s.
To contribute to Conspire, clone this repo locally and commit your code on a separate branch.
Please check that everything works by running the following before opening a pull-request:
make lint test
Conspire is licensed under the MIT license.
Copyright © 2014, Rowan Manning
FAQs
Generate frightening and very believable conspiracy theories
The npm package conspire receives a total of 0 weekly downloads. As such, conspire popularity was classified as not popular.
We found that conspire demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket Fix 2.0 brings targeted CVE remediation, smarter upgrade planning, and broader ecosystem support to help developers get to zero alerts.
Security News
Socket CEO Feross Aboukhadijeh joins Risky Business Weekly to unpack recent npm phishing attacks, their limited impact, and the risks if attackers get smarter.
Product
Socket’s new Tier 1 Reachability filters out up to 80% of irrelevant CVEs, so security teams can focus on the vulnerabilities that matter.