
Security News
Risky Biz Podcast: Making Reachability Analysis Work in Real-World Codebases
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Jade-bot is a Node-based Twitter bot which automates the process of Twittering for @jmthorntonwhat.
This doesn't mean there's never a human behind my Twitter account, just some of my account.
$ git clone <https://github.com/Raindeer44/jade-bot.git>
$ cd jade-bot/
$ npm
$ npm test
Jade-bot is also available on npm:
npm install --global jade-bot
Set up an application on the Twitter account you want to use: https://apps.twitter.com/app/new. Add to the .env
file:
.env
also needs the rate at which you want the bot to retweet (in minutes).
For example, .env
might look something like
CONSUMER_KEY=Fw***********P9
CONSUMER_SECRET=TD************Cq
ACCESS_TOKEN=31**************UC
ACCESS_TOKEN_SECRET=r0************S2
TWITTER_RETWEET_RATE=30
That's all the set up! Now just run
$ npm start
For continuous usage, either run on a server (if you happen to have one lying around) or deploy to Heroku, a serverless architecture or a similar service.
Please fork this repository and contribute back using pull requests.
Any contributions, large or small, major features, bug fixes and integration tests are welcomed and appreciated but will be thoroughly reviewed and discussed.
This bot was created with the help of Spences10's Node.js Twitter bot bootstrap, and with inspiration from @amanhimself.
FAQs
A Twitter retweet and favorite bot
We found that jade-bot demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.