
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
I don't even know, are there packages better
Just wanted to write mine, own
Soooo..
I gave them some methods which I use too often
npm install datypes
Or
yarn add datypes
First we have to initialize global function $
You have to run this function in your main file only once
import initTypes from "datypes"
initTypes()
Now We can define variables
Let's do
const person = $({
name: "Dann",
age: 18,
hobbies: $(["_", "_"]),
})
So what can we actually do?
person.$empty() // false
person.$forEach((value, key) => console.log(`${key} : `, value))
const cloneWithoutRefs = person.$clone()
person.$hasSome("age", "hobbies", "girlfriend") // true
person.$hasAll("age", "hobbies", "girlfriend") // false
person.hobbies.remove(0) // ["_"] removes it's element
person.hobbies.log() // logs value
Types now are global
let age: $number
let person: $object<MyInterface>
Also array method .readonly()
const arr = $([1, 2, 3]) // type - number[]
const readonlyArr = arr.readonly() // type - readonly number[]
const numbers = $.$ArrayLength(5, (i) => i) // [0, 1, 2, 3, 4]
const randomDigits = $.$ArrayLength(4, () => $.randomNumber(0, 9)) // [4, 6, 7, 1]
v1.3.0
v1.2.3
Install and check yourself!
FAQs
Global Javascript Extended Types
The npm package datypes receives a total of 3 weekly downloads. As such, datypes popularity was classified as not popular.
We found that datypes demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.