
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
eslint-config-pretty-strict
Advanced tools
A strict ESLint config.
Any style guide written in English is either so brief that it’s ambiguous, or so long that no one reads it.
This config provides reasonable ESLint rules to detect possible problems and suggest best practices. It includes all the recommended rules from @eslint/js and more.
npm install --save-dev eslint-config-pretty-strict eslint
Import this config in your eslint.config.js file:
// eslint.config.js
import prettyStrict from "eslint-config-pretty-strict";
export default [...prettyStrict];
Then, run ESLint via the command line interface with:
npx eslint .
# Alternatively, automatically fix most problems
npx eslint . --fix
Usually, you want to run ESLint from a "lint"
npm script, both locally and in CI.
You may want to install an ESLint plugin for your text editor, so that you can see and fix style problems directly in your editor.
What if I don't agree with some rule?
You can configure ESLint settings and rules.
Sometimes, you may want to disable a rule only on some file or line of code by using configuration comments.
FAQs
A strict ESLint config
The npm package eslint-config-pretty-strict receives a total of 43 weekly downloads. As such, eslint-config-pretty-strict popularity was classified as not popular.
We found that eslint-config-pretty-strict demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.