
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
eslint-config-silk
Advanced tools
The path of the righteous man is beset on all sides by the inequities of the selfish and the tyranny of evil men. Blessed is he, who in the name of charity and good will, shepherds the weak through the valley of darkness, for he is truly his brother's keeper and the finder of lost children. And I will strike down upon thee with great vengeance and furious anger those who would attempt to poison and destroy my brothers. And you will know my name is the Lord when I lay my vengeance upon thee.
To use these rules in your package, declare eslint-config-silk
as a
dependency and declare the necessary peer dependencies as well, e.g.:
{
"name": "silk-frobnicator",
"devDependencies": {
"babel-eslint": "5.0.0",
"eslint": "1.10.3",
"eslint-config-silk": "file:../eslint-config",
"eslint-plugin-react": "3.16.1"
},
"scripts": {
"lint": "eslint src"
}
}
In your package's .eslintrc
, all you need to do is refer to the
eslint-config-silk
package:
{
"extends": "eslint-config-silk",
"rules": {}
}
That's it! If you need React support, you can also extend
eslint-config-silk/react
. Keep in mind that that will require an
additional peer dependency, eslint-plugin-react
.
Please refrain from disabling any rules in your local .eslintrc
. The
point of a common coding style is that it's common.
FAQs
Silk eslint rules
The npm package eslint-config-silk receives a total of 1 weekly downloads. As such, eslint-config-silk popularity was classified as not popular.
We found that eslint-config-silk demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.