Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
eslint-config-godaddy-flow
Advanced tools
ESLint config for consistent style in node projects using Flow at GoDaddy.
Configuration for JavaScript applications using Flow, officially used at GoDaddy. There are many useful features:
eslint
.eslint
. Many rules will fix themselves!This style guide is used by dozens of product teams at GoDaddy. Have a question or comment? Open an issue!
npm i eslint-config-godaddy-flow --save-dev
There are two ways to use this style guide depending on your own tooling preference: directly using pre-included binaries or running eslint
yourself with a custom .eslintrc
config.
These use exactly the configuration defined in this package (eslint-config-godaddy-flow
) with auto-fix enabled automatically.
{
"scripts": {
"lint": "eslint-godaddy-flow files/ you/ want-to/ lint/"
}
}
.eslintrc
and run eslint
yourself:{
"root": true,
"extends": "godaddy-flow",
"rules": {
//
// Put any rules you wish to override here.
//
}
}
The --fix
option in eslint
is only available as a CLI option. Auto-fix will NOT be enabled unless you run eslint --fix
in your package.json
.
{
"scripts": {
"lint": "eslint --fix files/ you/ want-to/ lint/"
}
}
FAQs
ESLint config for consistent style in node projects using Flow at GoDaddy.
We found that eslint-config-godaddy-flow demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 14 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.