
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
generator-smartthings
Advanced tools
Generates a SmartThings SmartApp application
If you have NPM install (5.2.0+), just run the following command from a root repository directory:
npx yo smartthings
or,
npm init yo smartthings
Take note of the name, missing the
generator-prefix. This is intentional.
First, install Yeoman and generator-smartthings using npm (we assume you have pre-installed node.js).
npm install -g yo
npm install -g generator-smartthings
Then generate your new project:
yo smartthings
npm link
node --inspect `which yo` smartthings
DEBUG=yeoman:generator node --inspect `which yo` smartthings
If you are not familiar with SmartThings, we have extensive on-line documentation.
To create and manage your services and devices on SmartThings, create an account in the Developer Workspace.
The SmartThings Community is a good place share and ask questions.
There is also a SmartThings reddit community where you can read and share information.
Licensed under the Apache License, Version 2.0
Copyright 2019 SmartThings, Inc.
FAQs
Generates a SmartThings app
We found that generator-smartthings demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.