Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
gl-line3d
Advanced tools
A 3D WebGL line plot
var createScene = require('gl-plot3d')
var createLine = require('gl-line3d')
//Create the scene
var scene = createScene()
//Create a helix
var polyline = []
for(var i=0; i<100; ++i) {
var theta = (i / 100.0) * Math.PI
polyline.push([
Math.cos(3*theta),
Math.sin(3*theta),
(i/50) - 1.0
])
}
//Create the line plot
var lines = createLines({
gl: scene.gl,
position: polyline,
color: [1,0,0]
})
//Add the lines to the scene
scene.add(lines)
npm install gl-line3d
Creates a new line plot
options.gl
A WebGL contextoptions.position
An array of position values for the points on the curveoptions.color
An array of color values (or a singular color) for the curveoptions.pickId
The selection ID for the line plotoptions.lineWidth
The width of the lineoptions.dashes
An array of dash patterns representing the dash pattern. For example, [0.5,0.5,0.5]
options.dashScale
The number of times to repeat the dash patternoptions.opacity
The opacity of the lineslines.update(options)
Updates the plot. options
has the same properties as in the constructor
lines.lineWidth
The width of the lines
example
directoryTo run it, follow these steps:
git clone https://github.com/gl-vis/gl-line3d.git
cd gl-line3d
mkdir dist
browserify lines.js -o dist/bundle.js
browserify example/simple.js -o dist/simple_example_bundle.js
then open simple.html
in the example
directory.
(c) 2014 Mikola Lysenko. MIT License
FAQs
3D line plot
We found that gl-line3d demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 19 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.