
Company News
Socket Has Acquired Secure Annex
Socket has acquired Secure Annex to expand extension security across browsers, IDEs, and AI tools.
Pinoccio Node.js, CLI and Browser api!
var pinoccio = require('pinoccio'); // works in browserify and server side
// create an api instance with default options
var api = pinoccio(logintoken);// in the browser the token may be read from a pinoccio_id cookie,
api.rest({url:"/v1/troops"},function(error,data){
if(error) return console.log('oh no. i got an error getting my troops!',error);
console.log('troop data',data);
})
pinoccio help rest
pinoccio rest get v1/troops
https://docs.pinocc.io/api.html
##INSTALL
as a node library
npm install --save pinoccio
for cli
npm install -g pinoccio
in the browser you can use the hosted version.
<script src="https://api.pinocc.io/pinoccio.js"></script>
<script>
var api = pinoccioAPI();
// use the api
</script>
or serve the browserified (compiled) file published with the module from your own web server.
./node_modules/pinoccio/pinoccio-api.js
FAQs
pinoccio api client. http://pinocc.io
The npm package pinoccio receives a total of 2 weekly downloads. As such, pinoccio popularity was classified as not popular.
We found that pinoccio demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Company News
Socket has acquired Secure Annex to expand extension security across browsers, IDEs, and AI tools.

Research
/Security News
Socket is tracking cloned Open VSX extensions tied to GlassWorm, with several updated from benign-looking sleepers into malware delivery vehicles.

Product
Reachability analysis for PHP is now available in experimental, helping teams identify which vulnerabilities are actually exploitable.