
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
mako-cache
Advanced tools
A helper for reading/writing build caches.
This helper encapsulates the logic for loading and saving mako build cache files.
var cache = require('mako-cache');
// read a build tree from disk
cache.load().then(function (tree) {
// tree can be passed to a mako runner
});
// save a build tree to disk
cache.save(tree).then(function () {
// multiple writes will be queued, so they don't clobber one another
});
This API returns promises, except in the case of the documented sync functions.
Using the given project root, a cache file will be looked for in the mako
cache folder. (in the OS temp directory) If found, it will be unserialized
and returned as a Tree instance that can be given to a mako runner.
If no root is specified, it will assume you meant pwd.
If the given file does not exist, it will simply return null rather than
throwing an error.
The same as cache.load(root), except it is synchronous.
Saves the given tree to the mako cache folder. (in the OS temp directory) The
contents of file are a gzipped JSON representation of the tree.
The same as cache.save(tree), except it is synchronous.
Used to clear out the mako cache folder. If a root is specified, only that
project's cache file will be deleted. If no root is specified, the entire
folder will be deleted.
The same as cache.clear([root]), except it is synchronous.
Returns the calculated path to the file that the project root would have.
FAQs
Module for reading and writing a mako build cache.
We found that mako-cache demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.