Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
dtable-utils
Advanced tools
common utils
.
├── src
│ ├── cell-value-get # 数据格式化相关工具函数
│ ├── cell-value-set # 数据解析相关工具函数
│ ├── color # 颜色工具函数
│ ├── column # 列相关工具函数
│ ├── constants # 常量
│ ├── helper # 辅助工具。例如 number-precision
│ ├── filter # 过滤相关工具函数
│ ├── group # 分组相关工具函数
│ ├── sort # 排序相关工具函数
│ ├── link # Link 相关工具函数
│ ├── row # row 相关工具函数
│ ├── table # table 相关工具函数
│ ├── view # view 相关工具函数
│ ├── validate # 验证器。例如,过滤验证器
│ ├── common.js # 通用工具函数
│ ├── date.js # 日期工具函数
│ ├── number.js # 数字工具函数
│ └── index.js # 入口文件
├── tests # 单元测试
├── README.md
└── package.json
npm 或 yarn 安装
# npm
$ npm install dtable-utils --save
# yarn
$ yarn add dtable-utils
import { CellType } from 'dtable-utils';
npm test
npm run test-cov
FAQs
dtable common utils
The npm package dtable-utils receives a total of 480 weekly downloads. As such, dtable-utils popularity was classified as not popular.
We found that dtable-utils demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.