
Research
wget to Wipeout: Malicious Go Modules Fetch Destructive Payload
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
convict-format-with-validator
Advanced tools
Formats email
, ipaddress
and url
for convict with validator.js.
npm install convict-format-with-validator
An example config.js
file:
const convict = require('convict');
const convict_format_with_validator = require('convict-format-with-validator');
// Add all formats
convict.addFormats(convict_format_with_validator);
// Or add only specific formats:
// convict.addFormat(convict_format_with_validator.ipaddress);
// etc.
// Define a schema
var config = convict({
ip: {
doc: 'The IP address to bind.',
format: 'ipaddress',
default: '127.0.0.1',
env: 'IP_ADDRESS',
},
port: {
doc: 'The port to bind.',
format: 'port',
default: 8080,
env: 'PORT',
arg: 'port'
}
});
Validation done through validator.js:
email
ipaddress
- IPv4 and IPv6 addressesurl
Convict will automatically coerce environmental variables from strings to their proper types when importing them.
FAQs
Formats 'email', 'ipaddress' and 'url' for convict
The npm package convict-format-with-validator receives a total of 48,564 weekly downloads. As such, convict-format-with-validator popularity was classified as popular.
We found that convict-format-with-validator demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.
Product
We redesigned Socket's first logged-in page to display rich and insightful visualizations about your repositories protected against supply chain threats.