
Company News
/Security News
Socket Selected for OpenAI's Cybersecurity Grant Program
Socket is an initial recipient of OpenAI's Cybersecurity Grant Program, which commits $10M in API credits to defenders securing open source software.
eslint-import-context
Advanced tools
Provide context info for eslint-plugin-import-x, so no extra arguments need to be added.
Provide context info for eslint-plugin-import-x, so no extra arguments need to be added.
# pnpm
pnpm add eslint-import-context
# yarn
yarn add eslint-import-context
# npm
npm i eslint-import-context
# bun
bun add eslint-import-context
import { useRuleContext, getTsconfigWithContext } from 'eslint-import-context'
const ruleContext = useRuleContext()
const tsconfig = getTsconfigWithContext(ruleContext)
| 1stG | RxTS | UnTS |
|---|---|---|
| 1stG | RxTS | UnTS |
|---|---|---|
Detailed changes for each release are documented in CHANGELOG.md.
FAQs
Provide context info for eslint-plugin-import-x, so no extra arguments need to be added.
The npm package eslint-import-context receives a total of 4,100,208 weekly downloads. As such, eslint-import-context popularity was classified as popular.
We found that eslint-import-context demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Company News
/Security News
Socket is an initial recipient of OpenAI's Cybersecurity Grant Program, which commits $10M in API credits to defenders securing open source software.

Security News
Socket CEO Feross Aboukhadijeh joins 10 Minutes or Less, a podcast by Ali Rohde, to discuss the recent surge in open source supply chain attacks.

Research
/Security News
Campaign of 108 extensions harvests identities, steals sessions, and adds backdoors to browsers, all tied to the same C2 infrastructure.