Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
hubot-twitter-egosearch
Advanced tools
Twitter ego-searching for hubot.
Install via npm.
$ cd /path/to/hubot
$ npm install --save hubot-twitter-egosearch
And add to external-scripts.json
.
$ cat external-scripts.json
["hubot-twitter-egosearch"]
# required
$ export HUBOT_TWITTER_EGOSEARCH_CONSUMER_KEY="twitter_consumer_key_here"
$ export HUBOT_TWITTER_EGOSEARCH_CONSUMER_SECRET="twitter_consumer_secret_here"
$ export HUBOT_TWITTER_EGOSEARCH_ACCESS_TOKEN="twitter_access_token_here"
$ export HUBOT_TWITTER_EGOSEARCH_ACCESS_TOKEN_SECRET="twitter_access_token_secret_here"
# optional
$ export HUBOT_TWITTER_EGOSEARCH_SHOW_DETAIL="true" # if "true" then response will be more detailed
$ export HUBOT_TWITTER_EGOSEARCH_SEARCH_INTERVAL="1000 * 60 * 5" # defaults to "1000 * 60" msec
# Start searching with "hubot script"
human> hubot egosearch add hubot script
hubot> [13551] Now searching for hubot script
# Stop searching with "hubot script"
human> hubot egosearch rm 3551
hubot> Stopped searching for hubot script
# List searching keywords
human> hubot egosearch list
hubot> [13551] hubot script @room
hubot> [53595] some search word @room
# Also can use advanced search query
human> hubot egosearch add "hubot-twitter-egosearch" -from:qckanemoto
hubot> [29107] Now searching for "hubot-twitter-egosearch" -from:qckanemoto
FAQs
Twitter ego-searching for hubot
The npm package hubot-twitter-egosearch receives a total of 0 weekly downloads. As such, hubot-twitter-egosearch popularity was classified as not popular.
We found that hubot-twitter-egosearch demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.