
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
Interact with your git provider from your command line.
First install it globally:
npm install --global git-web
Then you will be able to run your brand new git commands:
git web # Open the repository home
git web -c # Open the list of commits
git web -c COMMITHASH # Open an specific commit
git ci # Open your CI/CD provider
git ci -e ID # Open a CI/CD execution details
git prs # Open PRs list
git pr # Create a new PR from current branch to master
git pr -s feature/1-my-feature -d develop # Create a PR from a feature branch to develop branch
git issues # Open issues list
git issue # Create a new issue
For more information, use git help [command] or git [command] --help. For example: git help web.
This is a CLI utility inspired by git-open, but implemented in node. Why? Because I think it has a wider community that can use and contribute to the project.
Open your git web interface right from your terminal! Both git and CI/CD will be autodetected using your git remote(s) and your repository config files.
The following features are available for git providers:
| AWS Codecommit | Bitbucket | Github | Gitlab | |
|---|---|---|---|---|
| Open repository home | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| Open commits list | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| Open an specific commit | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| Open pipeline executions list | NP | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| Open an specific pipeline execution | NP | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| Open pull requests list | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| Open an specific pull request | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| Open PR creation screen | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| Fork a repository | NP | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| Open issues list | NP | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| Open an specific issue | NP | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| Create a new issue | NP | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
NP: Not provided. Feature is not available in the provider.
And the following CI/CD providers are supported and autodetected:
| CircleCI | Travis | |
|---|---|---|
| Open pipeline executions list | :heavy_check_mark: | :heavy_check_mark: |
| Open an specific pipeline execution | :heavy_check_mark: | :heavy_check_mark: |
All contributions are welcome. There are a couple of ways to do so:
And always remember to be nice to each other!
MIT
FAQs
A CLI utility to interact with git providers on the web
The npm package git-web receives a total of 0 weekly downloads. As such, git-web popularity was classified as not popular.
We found that git-web demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.