
Security News
/Research
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
eslint-plugin-bem-xjst
Advanced tools
This plugin includes two ESLint environments:
You'll first need to install ESLint
:
$ npm install eslint --save-dev
Note: You may install ESLint globally using the -g
flag.
Next, install eslint-plugin-bem-xjst
:
$ npm install eslint-plugin-bem-xjst --save-dev
Note: If you installed ESLint globally (using the -g
flag) then you must also install eslint-plugin-bem-xjst
globally.
A globally-installed instance of ESLint can only use globally-installed ESLint plugins. A locally-installed ESLint can make use of both locally- and globally- installed ESLint plugins.
Add bem-xjst
to the plugins section of your .eslintrc
configuration file.
{
"plugins": [
"bem-xjst"
]
}
Note: We omitted the eslint-plugin-
prefix since it is automatically assumed by ESLint.
For BEMHTML templates add the bem-xjst/bemhtml
environment to .eslintrc
:
{
"env": {
"bem-xjst/bemhtml": true
}
}
For BEMTREE templates add the bem-xjst/bemtree
environment to .eslintrc
:
{
"env": {
"bem-xjst/bemtree": true
}
}
MIT © Andrew Abramov
FAQs
ESLint environments for bem-xjst
The npm package eslint-plugin-bem-xjst receives a total of 8 weekly downloads. As such, eslint-plugin-bem-xjst popularity was classified as not popular.
We found that eslint-plugin-bem-xjst demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.