
Security News
Scaling Socket from Zero to 10,000+ Organizations
Socket CEO Feross Aboukhadijeh shares lessons from scaling a developer security startup to 10,000+ organizations in this founder interview.
GScan is a tool for validating Ghost themes. It produces detailed reports of issues where themes need to be modified in order to be compatible with a specific version.
It is actively capable of dealing with the current and last major versions of Ghost (so at the time of writing v4, v3, v2 and v1).
GScan works on a system of rules. Each rule has a way to check whether it passes or fails and has help content which describes how to fix it. Each rule is also marked with an error level:
In addition, an error can be marked as fatal. A fatal error means, left unchecked a Ghost publication would throw 500 errors on certain pages because of the detected out-of-date or erroneous code.
In Ghost, we call GScan on boot. If any fatal errors are detected in Ghost(Pro) and in Ghost-CLI we call GScan as part of major upgrades. The upgrade will not be allowed to continue if any fatal errors are detected.
Errors are only marked as fatal errors if they would cause errors, and therefore should block a boot or an upgrade.
When developing new rules or testing gscan following tools are great to have in the toolbelt:
There are 3 ways to use gscan to validate your theme:
Visit https://gscan.ghost.org and upload your zip to our online version of Gscan.
Install using yarn / npm:
yarn global add gscan / npm install -g gscan
To run a local directory through the checks:
gscan /path/to/theme/directory
To run a local zip file through the checks:
gscan /path/to/theme.zip -z
By default, GScan scans themes for the latest Ghost version compatibility. You can also specify a Ghost version by using the following parameters (for Ghost 1.0, 2.0, 3.0, 4.0 and 5.0):
--v1 or -1
--v2 or -2
--v3 or -3
--v4 or -4 or --canary
--v5 or -5
Use the --canary parameter to check for the upcoming Ghost version.
Examples:
gscan /path/to/theme.zip -z1 - scan a theme in a zip file for Ghost 1.0 compatibility
gscan /path/to/theme/directory --v2 - can a theme in a directory for Ghost 2.0 compatibility
gscan /path/to/theme/directory --canary - scan a theme for the upcoming version of Ghost
Install using yarn/npm and then:
var gscan = require('gscan');
gscan.checkZip({
path: 'path-to-zip',
// if you need to check the theme for a different
// major Ghost version, you can pass it. Currently
// v1, v2, v3, v4 and canary (v5) are supported. Default is
// the latest Ghost version 4.0:
// checkVersion: 'v4',
name: 'my-theme'
}).then(function (result) {
console.log(result);
}).catch(function(err) {
console.log(err);
});
yarn devyarn start(Core team only)
yarn shipCopyright (c) 2013-2022 Ghost Foundation - Released under the MIT license. Ghost and the Ghost Logo are trademarks of Ghost Foundation Ltd. Please see our trademark policy for info on acceptable usage.
FAQs
Scans Ghost themes looking for errors, deprecations, features and compatibility
The npm package gscan receives a total of 6,173 weekly downloads. As such, gscan popularity was classified as popular.
We found that gscan demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 28 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Socket CEO Feross Aboukhadijeh shares lessons from scaling a developer security startup to 10,000+ organizations in this founder interview.

Research
Socket Threat Research maps a rare inside look at OtterCookie’s npm-Vercel-GitHub chain, adding 197 malicious packages and evidence of North Korean operators.

Research
Socket researchers identified a malicious Chrome extension that manipulates Raydium swaps to inject an undisclosed SOL transfer, quietly routing fees to an attacker wallet.