
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
CLI to measure latency and/ or response time.
A CLI made to measure latency and/ or response time by providing a URL of an endpoint via simple call or polling.
You can choose to either use the CLI directly with npx or to install the CLI globally with NPM.
* Please note that as of npx is bundled with NPM as of the version of 5.2.0.
# Use CLI with npx
$ npx delvery <command>
# Install globally via NPM
$ npm install -g delvery
Show help via -h or --help.
# delvery --help
$ delvery -h
Run latency test via -l or --latency.
# delvery --latency <url|ip_address>
# delvery -l <url|ip_address>
$ delvery "https://example.com"
Run polling test via -p or --polling.
# delvery --polling <url> [-H <headers> -d <post_data> -i <custom_intervals> -c <custom_cut_off_times> -s <stop_when_complete>]
# delvery -p <url> [-H <headers> -d <post_data> -i <custom_intervals> -c <custom_cut_off_times> -s <stop_when_complete>]
delvery -p "https://example.com" -H '{ "X-Random-Key": "4w3s0m3" }' -i "1.5,2,3,5" -c "3,5,7,9"
MIT License © The Zumata Team
FAQs
CLI to measure latency and/ or response time
The npm package delvery receives a total of 4 weekly downloads. As such, delvery popularity was classified as not popular.
We found that delvery demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.