Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
expo-ads-admob
Advanced tools
Provides support for the Google AdMob SDK (https://www.google.com/admob/) for mobile advertising. This module is largely based of the react-native-admob (https://github.com/sbugert/react-native-admob) module, as the documentation and questions surrounding
Provides support for the Google AdMob SDK (https://www.google.com/admob/) for mobile advertising. This module is largely based of the react-native-admob (https://github.com/sbugert/react-native-admob) module, as the documentation and questions surrounding that module may prove helpful. A simple example implementing AdMob SDK can be found at https://github.com/deadcoder0904/expo-google-admob.
For managed Expo projects, please follow the installation instructions in the API documentation for the latest stable release.
For bare React Native projects, you must ensure that you have installed and configured the expo
package before continuing.
expo install expo-ads-admob
Run npx pod-install
after installing the npm package.
In your app's Info.plist
file, add a GADApplicationIdentifier
key with a string value of your AdMob app ID, as shown in Google's Mobile Ads SDK iOS docs.
<key>GADApplicationIdentifier</key>
<string>ca-app-pub-3940256099942544~1458002511</string>
Add NSUserTrackingUsageDescription
key to your Info.plist
:
<key>NSUserTrackingUsageDescription</key>
<string>This identifier will be used to deliver personalized ads to you.</string>
Add the required SKAdNetworkIdentifier
items to your Info.plist
: Google SKAdNetwork.
Ensure that there is a meta-data
element inside the application
node inside AndroidManifest.xml
file (located typically under /android/app/src/main/AndroidManifest.xml
) with android:name
of "com.google.android.gms.ads.APPLICATION_ID"
and a value of your AdMob App ID. Google's Mobile Ads SDK documentation shows precisely how to do this here. In the end your AndroidManifest.xml
should look more or less like this:
<manifest>
<application>
...
<!-- Ensure that tag with this name and proper value is inside application -->
<meta-data
android:name="com.google.android.gms.ads.APPLICATION_ID"
android:value="ca-app-pub-xxxxxxxxxxxxxxxx~yyyyyyyyyy"/> <!-- App ID -->
<!-- You can find your App ID in the AdMob UI -->
...
</application>
</manifest>
This package automatically adds the INTERNET
permission. It's required to interact with Google's service.
<manifest>
<!-- Added permissions -->
<uses-permission android:name="android.permission.INTERNET" />
</manifest>
Contributions are very welcome! Please refer to guidelines described in the contributing guide.
FAQs
Provides support for the Google AdMob SDK (https://www.google.com/admob/) for mobile advertising. This module is largely based of the react-native-admob (https://github.com/sbugert/react-native-admob) module, as the documentation and questions surrounding
The npm package expo-ads-admob receives a total of 819 weekly downloads. As such, expo-ads-admob popularity was classified as not popular.
We found that expo-ads-admob demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 26 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.