
Security News
Axios Maintainer Confirms Social Engineering Attack Behind npm Compromise
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.
Pile of bones, library generator with git/babel/typescript/typedoc/readme/jest
npm install -g pob
mkdir some-lib
cd some-lib
pob
You can now use yarn run watch !
Write code in the src directory, it's then transpiled with babel and rollup to dist.
Use the task yarn run build or yarn run watch to transpile the code.
There are several environments: node, browser.
For each of these environments, there is also a dev version that add flow runtime checks.
Eslint is used to ensure a common coding style. I mostly follow the Airbnb coding style.
You can check the code by running the task yarn run lint. With an editor, install the plugins to validate the code as you type !
typedoc allows to document the code and generate the api. jest is used to generate the coverage.
Documentation can be generated by github actions and pushed to github-pages.
Tests are in the directory src with jest. Use the task yarn test to run the tests with jest.
yarn runbuild: clean the directory, build src to dist with rollupwatch: clean then build and watch with rolluplint: execute eslinttest: run tests with jestDocumentation (api + test coverage) is deployed to gh-pages via a github action.
yarn run releaseIn the process, this will pre-generate a changelog based on the commits, then open nano so you can adapt it if you want.
FAQs
Pile of bones, library generator with git/babel/typescript/typedoc/readme/jest
The npm package pob receives a total of 37 weekly downloads. As such, pob popularity was classified as not popular.
We found that pob demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.