Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
eslint-config-trails
Advanced tools
:shipit: Trails ESLint Configuration
The sharable ESLint config used in the trails.js projects.
The default ESLint configuration lints for ES6.
Install the default configuration package and eslint
dependency:
npm install --save-dev eslint-config-trails eslint
Add to your project's .eslintrc
file using the ESLint extends
attribute:
{
"extends": "trails"
}
The React.js eslint configuration lints for both ES6 and React.js.
Install the React.js configuration package and eslint
dependency:
npm install --save-dev eslint-config-trails eslint-plugin-react eslint
Add to your project's .eslintrc
file using the ESLint extends
attribute:
{
"extends": "trails/react"
}
FAQs
Trails.js eslint config
The npm package eslint-config-trails receives a total of 800 weekly downloads. As such, eslint-config-trails popularity was classified as not popular.
We found that eslint-config-trails demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.