
Research
/Security News
Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader
North Korean threat actors deploy 67 malicious npm packages using the newly discovered XORIndex malware loader.
el-component
Advanced tools
creates HTML from jade like expressions
Particularly useful if you are a fan of insertAdjacentHTML
but if setting innerHTML
is your
thing el
works just as well.
Install with npm:
$ npm install el-component
tag
- can be the name of HTML tag (span
, img
etc.) or a jade-like expressioncontent
- is an optional content of the tagattributes
- object with a map of attributes added to the generated HTML, class attribute is
merged with what was parsed from tagSome examples:
el('span', 'some text inside'); // <span>some text inside</span>
el('span.title', 'Title'); // <span class="title">Title</span>
el('span.title.car', 'Title'); // <span class="title car">Title</span>
el('span#title.car', 'Title'); // <span class="car" id="title">Title</span>
you can skip the tag name if you want div
:
el('#title', 'Title'); // <div id="title">Title</div>
el(); // <div></div>
el knows about void elements:
el('img', { src: 'http://example.com/img.png' }); // <img src="http://example.com/img.png">
el('iframe', { src: 'http://example.com' }); // <iframe src="http://example.com"></iframe>
A version of el
that can be used to render XML (SVG etc.). It has no notion of voids, which means it closes tags without content with />
.
Some examples:
el.xml('path', { d: 'M0 0H5V7Z' }); // <path d="M0 0H5V7Z"/>
MIT © Damian Krzeminski
FAQs
create HTML from jade-like expressions
The npm package el-component receives a total of 745 weekly downloads. As such, el-component popularity was classified as not popular.
We found that el-component demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
North Korean threat actors deploy 67 malicious npm packages using the newly discovered XORIndex malware loader.
Security News
Meet Socket at Black Hat & DEF CON 2025 for 1:1s, insider security talks at Allegiant Stadium, and a private dinner with top minds in software supply chain security.
Security News
CAI is a new open source AI framework that automates penetration testing tasks like scanning and exploitation up to 3,600× faster than humans.