Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
This module exposes the InChI API to node.js programs
A high-level javascript api is exposed by default when you require('inchi').
The full InChI API is exposed via the variable inchilib.
See doc/ for the yuidoc-generated API documentation.
This distribution contains files under several licenses.
The InCHI code is found in these directories: INCHI-1-API, INCHI-1-BIN, INCHI-1-DOC, INCHI-1-TEST
InChI code is copyright to IUPAC and the InChI Trust and is distributed under the terms of the IUPAC/InChI Trust license, as detailed in INCHI-1-API/readme.txt and INCHI-1-API/LICENSE
The CppUnitLite code is found in the directory CppUnitLite. It is copyright to Keith Bauer and distributed under the terms of the zlib/libpng license, as detailed in CppUnitLite/license.txt
The remaining code (C++ files under src/ and src/test and javascript files under lib/) is copyright to Cubane Canada, Inc. and is distributed under the terms of the MIT License, as detailed in MIT-LICENSE.
It is my intention to release this code in a usable, open-source package. If there are any questions about licensing or relicensing, please contact me directly at smikes@cubane.com
FAQs
International Chemical Identifier (InChI) for node.js programs
We found that inchi demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.