
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
A tool helps to generate ttf, woff, woff2 and css file at the same time. Supports splitting font files on demand.
A tool helps to generate ttf, woff, woff2 and css file at the same time. Supports splitting font files on demand.
一个可以根据常用字体格式文件,直接生成 ttf、woff 和 woff2 字体文件、以及包含该字体font-face定义的 css 文件。同时可以根据需要的字符集裁剪字体文件,实现类似font-spider的功能。
npx font-pack test.ttf -o dist
Output Files:
dist/test.css
dist/test.tff
dist/test.woff
dist/test.woff2
This will generate two font files, one only contain the charset required, and the other contains the rest charset of the font itself.
npx font-pack test.ttf --split-name test2 --split-chars abcdefg1234567
Output Files:
dist/test.css
dist/test.tff
dist/test.woff
dist/test.woff2
dist/test2.css
dist/test2.tff
dist/test2.woff
dist/test2.woff2
MIT License. See here for details.
FAQs
A tool helps to generate ttf, woff, woff2 and css file at the same time. Supports splitting font files on demand.
We found that font-pack demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.