Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
normalized-fs
Advanced tools
A drop-in replacement for fs
that aims to normalize the behavior across different platforms and environments, and to make filesystem access more resilient to errors.
$ npm install normalized-fs
$ yarn add normalized-fs
// import just like with fs
import fs from 'normalized-fs';
// now go and do stuff with it...
fs.readFileSync('some-file-or-whatever');
If you want to patch the global fs module (or any other fs-like module) you can do this:
NOTE: This should only ever be done at the top-level application layer, in order to delay on
EMFILE
errors from any fs-using dependencies. You should not do this in a library, because it can cause unexpected delays in other parts of the program.
import realFs from 'fs';
import nfs from 'normalized-fs';
nfs.normalize(realFs);
Big thanks to isaacs who created graceful-fs which this package is based upon.
FAQs
A drop-in replacement for fs that normalizes its behavior
We found that normalized-fs demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.