
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
This library works with elements represented as an array of HTML entities, and nodes that control the behavior of elements.
Elements is an array of objects. This array produces the code of elements you can use in your website.
Nodes is another array containing nodes that change the look and behavior of the generated elements.
The easiest way to get up and running is to use npm:
npm create nodality@latest my-app
Define an array of elements you want to display in your user interface:
let elements = [
{
type: "h1",
text: "Hello"
}
];
Define an array of nodes that will adjust the behaviour of the element.
This particular node will add the stroked text effect:
let nodes = [
{
op: "blast"
}
];
Add the nodes array using the .nodes() modifier, and use the .set() method to mount the result of the code to the website.
Use the code: true option to also display the source code of the elements:
new Des()
.nodes(nodes)
.add(elements)
.set({
mount: "#mount",
code: true
});
Also define a <div> with id="#mount" that will serve as a root element to render the UI.
Here is the complete working code which uses CDN for convenient testing.
<!-- div for mounting the result -->
<div id="#mount"></div>
<script type="module">
import {Des} from "https://www.unpkg.com/nodality@1.0.13/dist/index.esm.js";
let elements = [
{
type: "h1",
text: "Hello"
}
];
let nodes = [
{
op: "blast"
}
];
new Des()
.nodes(nodes)
.add(elements)
.set({
mount: "#mount",
code: true
});
</script>
After running this code:
<h1> element on the screen.blast modifier.FAQs
A lightweight library for declarative UI elements.
We found that nodality demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.