Security News
The Dark Side of Open Source
At Node Congress, Socket CEO Feross Aboukhadijeh uncovers the darker aspects of open source, where applications that rely heavily on third-party dependencies can be exploited in supply chain attacks.
email-marker-client
Advanced tools
Readme
This is an Email Marker API client for Node.js and browser written in Typescript.
npm i email-marker-client
or
yarn add email-marker-client
As demonstrated by this example, you can verify email by passing it to Email Marker verification service.
import { EmailMarkerClient } from 'email-marker-client';
...
const emailMarker = new EmailMarkerClient(config.EMAIL_MARKER_API_KEY);
const result = await emailMarker.verify('test@example.com');
console.log(`The email verification result is: ${result}`);
You can get an API key in your Email Marker account here.
Please read Email Marker API documentation.
Drop me an email to Mikhail Monchak
FAQs
Email Marker API client for Node.js and browser
The npm package email-marker-client receives a total of 1 weekly downloads. As such, email-marker-client popularity was classified as not popular.
We found that email-marker-client demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
At Node Congress, Socket CEO Feross Aboukhadijeh uncovers the darker aspects of open source, where applications that rely heavily on third-party dependencies can be exploited in supply chain attacks.
Research
Security News
The Socket Research team found this npm package includes code for collecting sensitive developer information, including your operating system username, Git username, and Git email.
Security News
OpenJS is warning of social engineering takeovers targeting open source projects after receiving a credible attempt on the foundation.