Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
mobify-capturejs
Advanced tools
A library for capturing your DOM.
Right now, there are no instructions on how to use capture.js standalone. Please go to www.mobifyjs.com for information on how to use capturing.
Get NodeJS v8.10 with npm v5.7: https://nodejs.org/en/download/
npm install
$(npm bin)/bower install
Then, run the following command to watch and build the capture.js file as you develop:
$(npm bin)/grunt serve
To run the tests in your browser
$(npm bin)/grunt serve
open http://localhost:3000/tests/index.html
To run the tests from the commandline
$(npm bin)/grunt test
To run the tests across several browsers using suacelabs
export SAUCE_USERNAME=<saucelabs username>
export SAUCE_ACCESS_KEY=<saucelabs access key>
$(npm bin)/grunt saucelabs
You can monitor test progress via the suacelabs dashbaord: https://app.saucelabs.com/dashboard/tests
The test suite will likely take several minutes to run across the test matrix
defined in Gruntfile.js
Then, do the following to ship the change:
Talk to @stellafang, @noahadams or @johnboxall
FAQs
A library for capturing your DOM.
The npm package mobify-capturejs receives a total of 0 weekly downloads. As such, mobify-capturejs popularity was classified as not popular.
We found that mobify-capturejs demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.