
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
eslint-config-ohar
Advanced tools
Based on eslint-config-standard with some minor improvements.
eslint-config-standard
?Standard is not bad, but there were some problems here.
npm install -D eslint-config-ohar
yarn add -D eslint-config-ohar
Shareable configs are designed to work with the extends
feature of .eslintrc
files.
You can learn more about
Shareable Configs on the
official ESLint website.
To use the JavaScript Standard Style shareable config, first run this:
npm install -D eslint-config-ohar eslint-plugin-standard eslint-plugin-promise eslint-plugin-import eslint-plugin-node
yarn add -D eslint-config-ohar eslint-plugin-standard eslint-plugin-promise eslint-plugin-import eslint-plugin-node
Then, add this to your .eslintrc file:
{
"extends": "standard"
}
Note: We omitted the eslint-config-
prefix since it is automatically assumed by ESLint.
You can override settings from the shareable config by adding them directly into your
.eslintrc
file.
The easiest way to use JavaScript Standard Style to check your code is to use the
standard
package. This comes with a global
Node command line program (standard
) that you can run or add to your npm test
script
to quickly check your style.
For the full listing of rules, editor plugins, FAQs, and more, visit the main JavaScript Standard Style repo.
MIT. Copyright (c) Feross Aboukhadijeh, Pavel Lysenko.
FAQs
JavaScript Ohar Style - ESLint Shareable Config
The npm package eslint-config-ohar receives a total of 5 weekly downloads. As such, eslint-config-ohar popularity was classified as not popular.
We found that eslint-config-ohar demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.