Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
jasmine-node
Advanced tools
This node.js module makes the wonderful Pivotal Lab's jasmine (http://github.com/pivotal/jasmine) spec framework available in node.js.
npm install jasmine-node -g
Write the specifications for your code in *.js and *.coffee files in the spec/ directory (note: your specification files must end with either .spec.js or .spec.coffee; otherwise jasmine-node won't find them!). You can use sub-directories to better organise your specs.
If you have installed the npm package, you can run it with:
jasmine-node
If you aren't using npm, you should add pwd
/lib to the $NODE_PATH
environment variable, then run:
node lib/jasmine-node/cli.js
You can supply the following arguments:
--autotest
, provides automatic execution of specs after
each changes--coffee
, allow execution of .coffee specs--color
, indicates spec output should uses color to
indicates passing (green) or failing (red) specs--noColor
, do not use color in the output--verbose
, verbose output as the specs are run--junitreport
, export tests results as junitreport xml format'Checkout spec/SampleSpecs.js to see how to use it.
Install the dependent packages by running:
npm install
Run the specs before you send your pull request:
scripts/specs
or
scripts/specs --verbose
FAQs
DOM-less simple JavaScript BDD testing framework for Node
We found that jasmine-node demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.