
Research
Security News
The Landscape of Malicious Open Source Packages: 2025 Mid‑Year Threat Report
A look at the top trends in how threat actors are weaponizing open source packages to deliver malware and persist across the software supply chain.
generator-ktor
Advanced tools
A Yeoman generator that brings the capability to generate server Ktor applications.
First, you need to have Node.js and npm
installed.
The generator is compatible with Node.js versions above 14.0.0.
To install Yeoman globally on your system, execute the following command:
npm install -g yo
With Node.js and Yeoman installed, you can run this command to install the Ktor generator:
npm install -g generator-ktor
To generate a new Ktor project, create a new directory and go into it:
mkdir ktor-sample
cd ktor-sample
Then, you can generate a project:
yo ktor
It will prompt you for a series of inputs such as a project name, a build system used for a project, a set of installed plugins, and so on.
Finally, you can run the generated project with the npm start
command.
FAQs
A command line interface to bootstrap the new Ktor project
We found that generator-ktor demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A look at the top trends in how threat actors are weaponizing open source packages to deliver malware and persist across the software supply chain.
Security News
ESLint now supports HTML linting with 48 new rules, expanding its language plugin system to cover more of the modern web development stack.
Security News
CISA is discontinuing official RSS support for KEV and cybersecurity alerts, shifting updates to email and social media, disrupting automation workflows.