
Security Fundamentals
Obfuscation 101: Unmasking the Tricks Behind Malicious Code
Attackers use obfuscation to hide malware in open source packages. Learn how to spot these techniques across npm, PyPI, Maven, and more.
jest-leak-detector
Advanced tools
Module for verifying whether an object has been garbage collected or not.
Module for verifying whether an object has been garbage collected or not.
Internally creates a weak reference to the object, and forces garbage collection to happen. If the reference is gone, it meant no one else was pointing to the object.
(async function () {
let reference = {};
let isLeaking;
const detector = new LeakDetector(reference);
// Reference is held in memory.
isLeaking = await detector.isLeaking();
console.log(isLeaking); // true
// We destroy the only reference to the object.
reference = null;
// Reference is gone.
isLeaking = await detector.isLeaking();
console.log(isLeaking); // false
})();
25.4.0
[expect]
Support async function
s in toThrow
(#9817)[jest-console]
Add code frame to console.error
and console.warn
(#9741)[jest-runtime, jest-jasmine2, jest-circus]
Experimental, limited ECMAScript Modules support (#9772 & #9842)[expect]
Restore support for passing functions to toHaveLength
matcher (#9796)[jest-changed-files]
--only-changed
should include staged files (#9799)[jest-circus]
Throw on nested test definitions (#9828)[jest-each]
each
will throw an error when called with too many arguments (#9818)[jest-runner]
Don't print warning to stdout when using --json
(#9843)FAQs
Module for verifying whether an object has been garbage collected or not.
The npm package jest-leak-detector receives a total of 21,391,173 weekly downloads. As such, jest-leak-detector popularity was classified as popular.
We found that jest-leak-detector demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security Fundamentals
Attackers use obfuscation to hide malware in open source packages. Learn how to spot these techniques across npm, PyPI, Maven, and more.
Security News
Join Socket for exclusive networking events, rooftop gatherings, and one-on-one meetings during BSidesSF and RSA 2025 in San Francisco.
Security News
Biome's v2.0 beta introduces custom plugins, domain-specific linting, and type-aware rules while laying groundwork for HTML support and embedded language features in 2025.