Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
eslint-plugin-bem-xjst
Advanced tools
This plugin includes two ESLint environments:
You'll first need to install ESLint
:
$ npm install eslint --save-dev
Note: You may install ESLint globally using the -g
flag.
Next, install eslint-plugin-bem-xjst
:
$ npm install eslint-plugin-bem-xjst --save-dev
Note: If you installed ESLint globally (using the -g
flag) then you must also install eslint-plugin-bem-xjst
globally.
A globally-installed instance of ESLint can only use globally-installed ESLint plugins. A locally-installed ESLint can make use of both locally- and globally- installed ESLint plugins.
Add bem-xjst
to the plugins section of your .eslintrc
configuration file.
{
"plugins": [
"bem-xjst"
]
}
Note: We omitted the eslint-plugin-
prefix since it is automatically assumed by ESLint.
For BEMHTML templates add the bem-xjst/bemhtml
environment to .eslintrc
:
{
"env": {
"bem-xjst/bemhtml": true
}
}
For BEMTREE templates add the bem-xjst/bemtree
environment to .eslintrc
:
{
"env": {
"bem-xjst/bemtree": true
}
}
MIT © Andrew Abramov
FAQs
ESLint environments for bem-xjst
We found that eslint-plugin-bem-xjst demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.