
Research
/Security News
5 Malicious Rust Crates Posed as Time Utilities to Exfiltrate .env Files
Published late February to early March 2026, these crates impersonate timeapi.io and POST .env secrets to a threat actor-controlled lookalike domain.
This addon provides a very simple abstraction to use enum attributes with ember data.
ember install ember-enum
You can define an enum attribute as follows:
import Model from 'ember-data/model';
import attr from 'ember-data/attr';
export default Model.extend({
status: attr('enum', {
options: [
'started',
'stopped'
],
defaultValue: 'started'
})
});
The value from the json response is expected to be a string. Now you can use the attribute in templates:
{{model.status.value}}
You can also use boolean methods to check if the enum has a certain value:
{{#if model.status.isStarted}}
Started!
{{/if}}
You can use a select element like this:
{{view 'select' content=model.status.options value=model.status.value}}
This project only works with ember-data 2.5 and higher.
This project is released under the MIT License.
FAQs
This addon provides a very simple abstraction to use enum attributes with ember data.
The npm package ember-enum receives a total of 0 weekly downloads. As such, ember-enum popularity was classified as not popular.
We found that ember-enum demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
/Security News
Published late February to early March 2026, these crates impersonate timeapi.io and POST .env secrets to a threat actor-controlled lookalike domain.

Security News
A recent burst of security disclosures in the OpenClaw project is drawing attention to how vulnerability information flows across advisory and CVE systems.

Research
/Security News
Mixed-script homoglyphs and a lookalike domain mimic imToken’s import flow to capture mnemonics and private keys.