
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
tiny file processor
npm i o7
const o7 = require('o7')
function middleware (files) {
files.map(file => file.contents.concat('\nhello!'))
}
o7([middleware], 'destination/').then(() => {
// success!
})
o7(Array(MIDDLEWARE), DESTINATION, [OPTIONS]) -> PromiseTakes an array of middleware functions that each receive a files argument,
which is an array of vfiles. Middleware
functions don't need to return anything, they can modify the files array
in-place. Middleware runs in the order it's defined in.
DESTINATION can be an absolute or relative path to where the modified files
should be outputted to.
OPTIONS is an optional object that can have two keys:
source: Where to read files from. Default is process.cwd()exclude: An array of files or directories to exclude. Must be strings.noRead: Doesn't read from disk, provides an empty files array instead.noWrite: Doesn't write to disk.Returns a promise with the processed files as its argument when finished writing.
AGPL 3.0 (see LICENSE)
FAQs
tiny file processor
We found that o7 demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.