
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
grunt-peach
Advanced tools
Search and replace strings in SQL dumps, including PHP serialized strings.
Search and replace strings in SQL dumps, including PHP serialized strings. Unofficial grunt task for Peach by Pete Saia
This plugin requires Grunt ~0.4.0
If you haven't used Grunt before, be sure to check out the Getting Started guide, as it explains how to create a Gruntfile as well as install and use Grunt plugins. Once you're familiar with that process, you may install this plugin with this command:
npm install --save-dev grunt-peach
Once the plugin has been installed, it may be enabled inside your Gruntfile with this line of JavaScript:
grunt.loadNpmTasks('grunt-peach');
Run this task with the grunt peach
command.
Task targets, files and options may be specified according to the grunt Configuring tasks guide.
Type: Boolean
Default value: false
Set log
to true
to log the output SQL to console.
Type: Boolean
Default value: true
Set force
to true
to report errors but not fail the task.
grunt.initConfig({
peach: {
dev: {
options: {
force: true
},
src: 'input.sql',
dest: 'output.sql',
from: 'http://my-development-server.dev',
to: 'http://the-production-server.com'
}
}
});
log
optionFAQs
Search and replace strings in SQL dumps, including PHP serialized strings.
The npm package grunt-peach receives a total of 0 weekly downloads. As such, grunt-peach popularity was classified as not popular.
We found that grunt-peach demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.