
Research
NPM targeted by malware campaign mimicking familiar library names
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
A function that returns a copy of the plain object given as first argument but without the keys provided as the other argument(s)
A utility function that returns a copy of the object given as first argument but without the keys provided as the other argument(s).
Install via npm:
% npm install except
Just require and call:
var except = require('except');
var myobj = { foo: true, bar: 1, baz: 'yes' };
except(myobj, 'foo') // => { bar: 1, baz: 'yes' }
except(myobj, 'foo', 'baz') // => { bar: 1 }
except(myobj, ['foo', 'bar']) // => { baz: 'yes' }
Here's a quick guide:
Fork the repo and make install
.
Run the tests. We only take pull requests with passing tests, and it's great to know that you have a clean slate: make test
.
Add a test for your change. Only refactoring and documentation changes require no new tests. If you are adding functionality or are fixing a bug, we need a test!
Make the test pass.
Push to your fork and submit a pull request.
Released under The MIT License.
FAQs
A function that returns a copy of the plain object given as first argument but without the keys provided as the other argument(s)
The npm package except receives a total of 10,403 weekly downloads. As such, except popularity was classified as popular.
We found that except demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
Research
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.