Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
git-repo-name
Advanced tools
Get the repository name from the git remote origin URL.
Install with npm:
$ npm install git-repo-name --save
var repoName = require('git-repo-name');
By default process.cwd()
is used, but you can alternatively specify a different directory as the first argument.
async
repoName(function(err, name) {
//=> 'git-repo-name'
});
sync
repoName.sync();
//=> 'git-repo-name'
Optionally specify the directory to use.
async
repoName('foo', function(err, name) {
//=> 'repo-foo-name'
});
sync
repoName.sync('foo');
//=> 'repo-foo-name'
You might also be interested in these projects:
Pull requests and stars are always welcome. For bugs and feature requests, please create an issue.
Generate readme and API documentation with verb:
$ npm install verb && npm run docs
Or, if verb is installed globally:
$ verb
Install dev dependencies:
$ npm install -d && npm test
Jon Schlinkert
Copyright © 2016, Jon Schlinkert. Released under the MIT license.
This file was generated by verb, v0.9.0, on May 03, 2016.
FAQs
Get the repository name from the git remote origin URL.
The npm package git-repo-name receives a total of 75,710 weekly downloads. As such, git-repo-name popularity was classified as popular.
We found that git-repo-name demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.