Security News
New Python Packaging Proposal Aims to Solve Phantom Dependency Problem with SBOMs
PEP 770 proposes adding SBOM support to Python packages to improve transparency and catch hidden non-Python dependencies that security tools often miss.
eslint-config-vtech
Advanced tools
The ESLint config used for front-end projects at V-Technologies.
This config is heavily based on eslint-config-airbnb, except for some custom rules which better fits our coding style.
Install the package and its peer dependencies:
npm install --save-dev eslint eslint-config-vtech babel-eslint eslint-plugin-babel eslint-plugin-react eslint-plugin-import eslint-plugin-jsx-a11y
Configure ESLint by adding .eslintrc
at the root of your project:
{
"extends": "vtech"
}
Use with webpack
npm install --save-dev eslint-loader
Then add in your webpack.config.js
{
test: /\.js$/,
exclude: /node_modules/,
use: 'eslint-loader'
}
FAQs
The ESLint config used at V-Technologies
The npm package eslint-config-vtech receives a total of 4 weekly downloads. As such, eslint-config-vtech popularity was classified as not popular.
We found that eslint-config-vtech demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
PEP 770 proposes adding SBOM support to Python packages to improve transparency and catch hidden non-Python dependencies that security tools often miss.
Security News
Socket CEO Feross Aboukhadijeh discusses open source security challenges, including zero-day attacks and supply chain risks, on the Cyber Security Council podcast.
Security News
Research
Socket researchers uncover how threat actors weaponize Out-of-Band Application Security Testing (OAST) techniques across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.