
Security News
New CNA Scorecard Tool Ranks CVE Data Quality Across the Ecosystem
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
# g4c - Git for Cloud
A basic pure js git CLI implementation based on isomorphic-git.
- g4c clone URL
- g4c clone URL DIRECTORY
- g4c clone # (automatically clones from package.json, or secrets file)
- g4c checkout --force HEAD
- g4c pull
- g4c pull --ff-only
- g4c status
- g4c add --all
- g4c commit -m "My commit message"
- g4c push
TODO:
- git # As an alias, comming soon
- g4c add FILE(s)
- g4c add .
- git pull origin pull/123/head
npm i -D g4c
npm i -g g4c
-- Global installgit clone
, git pull
, and git push
.All of these are optional:
// SECRETS.g4c.json
{
"proxy": "https://cors.isomorphic-git.org",
"useProxyOnBareMetal": false,
"username": "inu",
"password": "neko",
"authorName": "John Doe",
"authorEmail": "john@example.com",
"repoUrl": "https://github-sucks.com/user/project.git"
}
FAQs
A basic pure js git CLI implementation based on isomorphic-git.
The npm package g4c receives a total of 2 weekly downloads. As such, g4c popularity was classified as not popular.
We found that g4c demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
Research
/Security News
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.
Research
/Security News
Socket uncovered 11 malicious Go packages using obfuscated loaders to fetch and execute second-stage payloads via C2 domains.