Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
grunt-htmllint
Advanced tools
Unofficial html5 linter and validator.
This plugin requires Grunt ~0.4.5
If you haven't used Grunt before, be sure to check out the Getting Started guide, as it explains how to create a Gruntfile as well as install and use Grunt plugins.
It also goes into the process of using npm
and node
. If you haven't installed NodeJS before, now is the time. Go to NodeJS (linked from the Grunt site) to download.
npm
is installed with node
.
Once you're familiar with that process, you may install this plugin with this command:
npm install grunt-htmllint --save-dev
Once the plugin has been installed, it may be enabled inside your Gruntfile with this line of JavaScript:
grunt.loadNpmTasks('grunt-htmllint');
In your project's Gruntfile, add a section named htmllint
to the data object passed into grunt.initConfig()
.
grunt.initConfig({
htmllint: {
your_target: {
options: {
force: false,
plugins: ['htmllint-plugin-name'],
/* htmllint options go here */
},
src: [
'path/to/yo/html_files'
]
}
},
});
Type: Boolean
Default value: false
A boolean value that determines whether or not to fail the build on any lint error. If the value is true, lint errors will not fail the build.
Type: Array
Default value: []
An array of strings, each of which should be the name of an htmllint plugin to require and use.
Type: Boolean
or String
Default value: false
If set to true, a .htmllintrc
file will be loaded (relative to your Gruntfile.js
) and
will override the options argument (options.force will no be overriden).
If set to a string, the file path contained in the string will be loaded.
Type: Object
Default value: {}
The object passed to htmllint as the opts
argument.
In this example the default options are used to lint the html files in test/fixtures
.
If any of the html files have any lint error, the task will fail and print the errors
on the screen.
grunt.initConfig({
htmllint: {
options: {},
src: [
'test/fixtures/*.html'
],
},
});
In this example, some custom options are passed. If any lint errors occur, they will not fail the task, but will still be printed. Also, no more than 5 lint errors will be reported. After hitting the maximum number of errors, no more files will be processed.
grunt.initConfig({
htmllint: {
options: {
force: true,
opts: { maxerr: 5 }
},
src: [
'test/fixtures/*.html'
],
},
});
In lieu of a formal styleguide, take care to maintain the existing coding style. Add unit tests for any new or changed functionality. Lint and test your code using Grunt.
htmllint
-> 0.2.4options.htmllintrc
to allow specifying path to an htmllintrc file (#11)htmllint
-> 0.2.3htmllint
-> 0.2.2htmllint
-> 0.2.1htmllintrc
option, allows users to specify configuration in a separate filehtmllint
-> 0.2.0htmllint
-> 0.0.12htmllint
-> 0.0.11htmllint
-> 0.0.10htmllint
-> 0.0.9htmllint
-> 0.0.7htmllint
-> 0.0.6htmllint
fixes that stop throws on text elementshtmllint
-> 0.0.5htmllint
version numberhtmllint
-> 0.0.4opts.maxerr
option supporthtmllint
dependencyFAQs
A grunt plugin for the unofficial HTML5 linter.
We found that grunt-htmllint demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.