Security News
The Dark Side of Open Source
At Node Congress, Socket CEO Feross Aboukhadijeh uncovers the darker aspects of open source, where applications that rely heavily on third-party dependencies can be exploited in supply chain attacks.
picture-tube
Advanced tools
Readme
Render images on the terminal.
var pictureTube = require('picture-tube')
var tube = pictureTube();
tube.pipe(process.stdout);
var fs = require('fs');
fs.createReadStream('robot.png').pipe(tube);
Usage: picture-tube OPTIONS { file or uri }
Options:
--cols number of columns to use for output
var pictureTube = require('picture-tube');
Return a readable/writable stream that reads png image data and writes ansi terminal codes.
Set the number of columns to display the image as with opts.cols
.
Right now only png files work.
To install as a library, with npm do:
npm install picture-tube
To install the command-line tool, with npm do:
npm install -g picture-tube
MIT
FAQs
render 256 color images on the terminal
The npm package picture-tube receives a total of 674 weekly downloads. As such, picture-tube popularity was classified as not popular.
We found that picture-tube demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
At Node Congress, Socket CEO Feross Aboukhadijeh uncovers the darker aspects of open source, where applications that rely heavily on third-party dependencies can be exploited in supply chain attacks.
Research
Security News
The Socket Research team found this npm package includes code for collecting sensitive developer information, including your operating system username, Git username, and Git email.
Security News
OpenJS is warning of social engineering takeovers targeting open source projects after receiving a credible attempt on the foundation.