Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
metalsmith
Advanced tools
An extremely simple, pluggable static site generator.
$ npm install metalsmith
With a directory structure like this ...
/blog
/src
/a-post.md
/another-post.md
... running Metalsmith ...
$ metalsmith
... will create:
/blog
/build
/a-post.html
/another-post.html
Usage: metalsmith [options]
Options:
-h, --help output usage information
-c, --config set a config file
-d, --destination set the destination directory
-s, --source set the source directory
Create a new Metalsmith
instance for a working dir
.
Add the given plugin
function to the middleware stack.
Set the relative path
to the source directory, or get the full one if no path
is provided. The source directory defaults to ./src
.
Set the relative path
to the destination directory, or get the full one if no path
is provided. The destination directory defaults to ./build
.
Set global metadata that should be applied to each file, in addition to any YAML front-matter.
Join any amount of paths...
to the working directory.
Build with the given settings and plugins, and call fn(err)
.
MIT
[0.0.4] - 2014-02-05
FAQs
An extremely simple, pluggable static site generator.
The npm package metalsmith receives a total of 24,065 weekly downloads. As such, metalsmith popularity was classified as popular.
We found that metalsmith demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.