
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
npm install --save-dev jja
cls、clear:清理终端屏幕,两个作用相同dns: 域名解析及连通性判断remove可用 npx jja rm <filename> <filename> <...> 的模式进行移除文件或文件夹
npx jja rm <filename>
如果不想显示该过程的 log 信息,可以使用 -i 忽略掉:
npx jja rm -i filename
package使用 --diff 或 -d 进行 package.json 文件内的依赖版本的检测,查看是否有更新(更新以本地安装的应用版本为准,而不是以 package.json 文件给出的范围)可用,给出反馈
npx jja package --diff
# 或者使用缩写
npx jjs pkg -d
# 指定源
npx jjs pkg -d=淘宝
npx jjs pkg -d=腾讯
npx jjs pkg -d=中科大
npx jjs pkg -d=yarn
# 默认源 (指定值不存在则默认使用 `官方`)
npx jjs pkg -d=官方
updatenpx jja up
升级前尽量保证你的功能完善,且 git 目录干净
添加了域名解析,使用线上的域名,目前仅支持 A 记录的查询
# 简单使用(将返回 github.com 的解析地址)
npx jja dns
# 使用自定义的网址
npx jja dns --domain=www.npmjs.com
npx jja dns -d=www.npmjs.com
# 使用自定义的判断联通的接口(默认 443)
npx jja dns --port=80
npx jja dns -p=80
# 展示每一个测试的 dns 信息
npx jja dns --not-covered
npx jja dns -n
使用 run 达到 && 的执行串联的效果。当然,不仅仅只为了替代两个字符的 && 而选用三个字符的 run 来多此一举。因为在 Windows 上无法像使用 shell 使用 XXX=xxx 一样简单的使用环境变量。所以使用 jja run 来简化这一过程。
{
"scripts": {
"dev": "jja cls run PORT=9463 docusaurus start"
}
}
当然,在 Windows 上有自己的设置运行环境变量的方式:
{
"scripts": {
"dev:cmd": "jja cls && set PORT=9463 && docusaurus start",
"dev:powerShell": "jja cls && $env:PORT=9463; docusaurus start"
}
}
而在 unix 系统上可以使用常用的:
{
"scripts": {
"dev:unix": "jja cls && PORT=9463 docusaurus start"
}
}
FAQs
一些在终端的执行动作 🥜
We found that jja demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.