Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
gulp-flatmap
Advanced tools
map each file in a stream into multiple files that are piped out
$ npm install --save-dev gulp-flatmap
var gulp = require('gulp');
var flatmap = require('gulp-flatmap');
var uglify = require('gulp-uglify');
var path = require('path');
var concat = require('gulp-concat');
gulp.task('default', function () {
return gulp.src('*.json')
.pipe(flatmap(function(stream, file){
var contents = JSON.parse(file.contents.toString('utf8'));
//contents.files is an array
return gulp.src(contents.files)
//uglify each file individually
.pipe(uglify())
//combine the files
.pipe(concat(path.basename(file.path)));
}))
.pipe(gulp.dest('dist'));
});
The flatmap method takes one argument, a function. This function is called once for each file piped to flatmap
and is passed a stream as its first argument and the vinyl file as its second argument. The stream contains only one file.
You can optionally return a stream from the flatmap
function. All the streams returned from flatmap
will be combined and their contents will be emited by flatmap
.
MIT © Marius Gundersen
FAQs
map each file in a stream into multiple files that are piped out
The npm package gulp-flatmap receives a total of 12,042 weekly downloads. As such, gulp-flatmap popularity was classified as popular.
We found that gulp-flatmap demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.