
Security News
Axios Maintainer Confirms Social Engineering Attack Behind npm Compromise
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.
iso-timestamp
Advanced tools
Generate ISO 8601 timestamp: YYYYMMDDhhmmssSSS
npm install iso-timestamp
or
yarn add iso-timestamp
or
pnpm add iso-timestamp
timestamp(options?) or timestamp(date, options?)date: Custom date
options:
excludeTime: Exclude time, i.e. hour, minute and second. Default: falseexcludeMillisecond: Exclude millisecond from time. Default: falseseparator: Separator among elements of the timestamp. Default: ''import timestamp from 'iso-timestamp'
// Or import { timestamp } from 'iso-timestamp'
timestamp()
// return current timestamp: 202408070101123
timestamp({ excludeMillisecond: true })
// return timestamp with millisecond excluded: 202408070101
timestamp({ excludeTime: true })
// return timestamp with time excluded: 20240807
timestamp(new Date('2050-03-04T12:03:04.123'), { excludeMillisecond: true })
// return timestamp with custom Date: 20500304120304
timestamp({ separator: '-', excludeTime: true })
// return timestamp with custom separator: 2024-08-07
👤 GloryWong
Give a ⭐️ if this project helped you!
FAQs
Generate ISO 8601 timestamp: YYYYMMDDhhmmssSSS
We found that iso-timestamp demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.