Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
eslint-config-muriki
Advanced tools
npm install --save-dev eslint eslint-config-muriki
You'll probably want to use eslint-plugin-muriki instead.
To lint your code with ESLint create a file .eslintrc.js
in your project root.
module.exports = { extends: 'muriki' };
Add a lint script to your package.json
.
{
"scripts": {
"lint": "eslint ...[file|dir]"
}
}
You can use a few different configs.
You can extend a preset like so.
module.exports = { extends: 'muriki/test' };
It's obligatory to install IDE plugins and enabled auto-fixing.
Atom
https://github.com/AtomLinter/linter-eslint
Sublime Text
https://github.com/roadhump/SublimeLinter-eslint
VSCode
https://marketplace.visualstudio.com/items?itemName=dbaeumer.vscode-eslint
WebStorm
https://www.jetbrains.com/help/webstorm/2016.1/eslint.html
It's possible to lint your code on commit to keep the repository clean and the feedback early.
Dependencies
npm install --save-dev husky lint-staged
package.json
{
"scripts": {
{ "precommit": "lint-staged" }
},
"lint-staged": { "*.js": "eslint" }
}
FAQs
My extensive, opinionated ESLint config.
The npm package eslint-config-muriki receives a total of 18 weekly downloads. As such, eslint-config-muriki popularity was classified as not popular.
We found that eslint-config-muriki demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.