Security News
CISA Brings KEV Data to GitHub
CISA's KEV data is now on GitHub, offering easier access, API integration, commit history tracking, and automated updates for security teams and researchers.
The simplest javascript icon editor.
It's a very simple library to create and render your own icons by just providing a codified string.
First, go to the editor and create an icon. Copy the resulting code to your project and the icon will render as an img
tag.
You can pass an options object when rendering an icon. Here's a full feature example:
import PixelIcon from "pixel-icon"
PixelIcon(yourContainer, yourIconCode, {
// color palette of your image.
colors: [
"#000",
"#47A8BD",
"#9FD356",
"#9C3848",
"#FFF"
],
// if true, renders a border between each pixel to create a grid-like image
hasBorder: false,
// number of vertical and horizontal pixels
size: 20
})
The properties size
and colors
will directly affect the size of the codified image as
it will need more characters to be rendered.
FAQs
The simplest pixel icon generator
The npm package pixel-icon receives a total of 2 weekly downloads. As such, pixel-icon popularity was classified as not popular.
We found that pixel-icon demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
CISA's KEV data is now on GitHub, offering easier access, API integration, commit history tracking, and automated updates for security teams and researchers.
Security News
Opengrep forks Semgrep to preserve open source SAST in response to controversial licensing changes.
Security News
Critics call the Node.js EOL CVE a misuse of the system, sparking debate over CVE standards and the growing noise in vulnerability databases.