Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
eslint-config-vtex-react
Advanced tools
eslint-config-vtex-react
This package provides VTEX's .eslintrc
for React projects as an extensible shared config.
Not all React applications live in the same context, different rules are needed for different scenarios. To solve this, three presets are provided:
vtex-react
- Base react configuration. Can be used in any React project.vtex-react/io
- To be used in VTEX IO React applications.vtex-react/native
- To be used in react-native
applications.Assuming you already have ESLint installed, run:
yarn add -D eslint-config-vtex-react typescript prettier
After installing the module, just add it to your extends
array inside your .eslintrc
.
// .eslintrc
{
"extends": ["vtex-react"]
}
As any other eslint preset, it's possible to override some rules and configurations. We encourage trying to keep the closest possible to the preset rules, but every project is different and sometimes overriding is needed, use it carefully.
FAQs
VTEX's eslint config for React
The npm package eslint-config-vtex-react receives a total of 7,257 weekly downloads. As such, eslint-config-vtex-react popularity was classified as popular.
We found that eslint-config-vtex-react demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 60 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.