
Company News
/Security News
Socket Selected for OpenAI's Cybersecurity Grant Program
Socket is an initial recipient of OpenAI's Cybersecurity Grant Program, which commits $10M in API credits to defenders securing open source software.
example-bower-resolver
Advanced tools
Sample implementation of a bower pluggable resolver.
Bower resolver designed to illustrate best practices. This simple resolver only supports the following two commands:
bower install example://applebower install ex://appleOk, so the example "apple" component isn't that interesting. This effort is meant to create a concise implementation of the bower Pluggable Resolver architecture.
There are two steps for bower pluggable resolver installation.
First, install this package globally with:
npm install -g example-bower-resolver
Second, configure the .bowerrc file to use this resolver:
{
"resolvers" : [
"example-bower-resolver"
]
}
Exercise the resolver with:
bower install ex://apple
Run the mocha tests with:
npm test
Run the istanbul coverage analysis with:
npm run coverage
FAQs
sample implementation of a bower pluggable resolver
The npm package example-bower-resolver receives a total of 4 weekly downloads. As such, example-bower-resolver popularity was classified as not popular.
We found that example-bower-resolver demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Company News
/Security News
Socket is an initial recipient of OpenAI's Cybersecurity Grant Program, which commits $10M in API credits to defenders securing open source software.

Security News
Socket CEO Feross Aboukhadijeh joins 10 Minutes or Less, a podcast by Ali Rohde, to discuss the recent surge in open source supply chain attacks.

Research
/Security News
Campaign of 108 extensions harvests identities, steals sessions, and adds backdoors to browsers, all tied to the same C2 infrastructure.