
Security News
MCP Community Begins Work on Official MCP Metaregistry
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
csv-transpose
Advanced tools
Transpose (rotate) data from rows to columns or vice verse in csv/tsv
# for cli
npm i -g csv-transpose
# for import usage
npm i csv-transpose
Executables:
csv-transpose
tsv-transpose
csv-transpose --help
csv-transpose -i in.csv -o out.csv
cat in.csv | csv-transpose > out.csv
let lib = require('csv-transpose')
let text = '...some csv text...'
let separator = ','
text = lib.transpose(text, separator)
import { transpose } from 'csv-transpose'
let text = '...some csv text...'
let separator = ','
text = lib.transpose(text, separator)
The file mode and pipe mode can be used in combination.
This project is licensed with BSD-2-Clause
This is free, libre, and open-source software. It comes down to four essential freedoms [ref]:
FAQs
Transpose (rotate) data from rows to columns or vice verse in csv
The npm package csv-transpose receives a total of 947 weekly downloads. As such, csv-transpose popularity was classified as not popular.
We found that csv-transpose demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.