
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
jupyterlab-chart-editor
Advanced tools
A JupyterLab extension for editing Plotly charts, based on https://github.com/plotly/react-chart-editor

jupyter labextension install jupyterlab-chart-editor
Create and display a figure
import plotly.graph_objs as go
import plotly.io as pio
fig = go.Figure()
fig.add_scatter(y=[2, 4, 3, 2.5])
fig.show()

Write figure to JSON
pio.write_json(fig, 'scatter.plotly')
Right-click scatter.plotly from the file menu and open with "Plotly Editor". Make some changes to the figure, then use the file menu to save as scatter-styled.plotly.
Then import scatter-styled.plotly back into plotly.py
fig_styled = pio.read_json('scatter-styled.plotly')
fig_styled

jupyter labextension uninstall jupyterlab-chart-editor
FAQs
A JupyterLab extension for creating and editing Plotly charts
The npm package jupyterlab-chart-editor receives a total of 6 weekly downloads. As such, jupyterlab-chart-editor popularity was classified as not popular.
We found that jupyterlab-chart-editor demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 17 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.