
Security News
/Research
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
g2-ops-components
Advanced tools
We are building this with a living style guide to showcase how to use the various components, using React Styleguidist.
The styleguide will be available at https://g2-ops-styleguide.copart.com/
While developing, it is useful to serve the styleguide using yarn styleguide
, which will hot reload changes as you develop.
Basic knowledge of React. Using Material/Fabric components. Please refer to React-Styleguidist cookbook for documenting components.
git clone https://github.com/copartit/g2-ops-component-library.git
cd g2-ops-component-library
yarn install or npm install
yarn install
to install dependenciesyarn styleguide
to generate and serve style guideyarn test
to run testsyarn run build
to build for productionyarn run styleguide:build
to build a static version of the styleguide for deploymentWe are aiming to build from the ground up with tests where appropriate, using Mocha, Chai and Enzyme.
To execute the tests, simply run yarn test
.
To deploy follow the instructions on Deploy.md
Contributions are welcome. Please create Pull Requests for enhancements, bug fixes.
FAQs
G2 Ops Component Library
We found that g2-ops-components demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.