
Research
Security News
The Landscape of Malicious Open Source Packages: 2025 Mid‑Year Threat Report
A look at the top trends in how threat actors are weaponizing open source packages to deliver malware and persist across the software supply chain.
import-sort-style-eslint
Advanced tools
An import-sort style that is compatible with ESLint's sort-imports rule
Supply Chain Security
Vulnerability
Quality
Maintenance
License
A style for import-sort that conforms to the ESLint rule sort-imports.
// Modules with side effects (not sorted because order may matter)
import "a";
import "c";
import "b";
// Modules with only namespace member sorted by member
import * as aa from "aa";
import * as bb from "bb";
// Modules with multiple members sorted by first member
import aaa, {bbb} from "aaa";
import {ccc, ddd} from "ccc";
import eee, * as fff from "eee";
// Modules with single member sorted by member
import aaaa from "aaaa";
import {bbbb} from "bbbb";
FAQs
An import-sort style that is compatible with ESLint's sort-imports rule
The npm package import-sort-style-eslint receives a total of 11,847 weekly downloads. As such, import-sort-style-eslint popularity was classified as popular.
We found that import-sort-style-eslint demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A look at the top trends in how threat actors are weaponizing open source packages to deliver malware and persist across the software supply chain.
Security News
ESLint now supports HTML linting with 48 new rules, expanding its language plugin system to cover more of the modern web development stack.
Security News
CISA is discontinuing official RSS support for KEV and cybersecurity alerts, shifting updates to email and social media, disrupting automation workflows.