Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
protoblast
Advanced tools
Extend native objects with helpful methods to speed up development, or leave the native objects alone and use bound methods.
$ npm install protoblast
For more information and API documentation, visit the Protoblast homepage.
You can use Protoblast in 2 ways.
This is the easiest way to use all the new methods & shims. Ideal for internal or big projects.
// Require protoblast and execute the returned function
require('protoblast')();
var str = 'Get what we want';
// New native methods, like after, will have been added
str.after('what');
// ' we want'
You can also get an object that has pre-bound all the new methods, without modifying anything.
It's more verbose, but should be the way to use Protoblast in redistributable modules.
// Require protoblast and execute the returned function with `false` as parameter
var Blast = require('protoblast')(false);
var str = 'Get what we want';
// Native objects will have been left alone, they can be accessed like this:
Blast.Bound.String.after(str, 'what');
// ' we want'
0.5.0 (2018-02-17)
Promise.resolve()
based solution for browser-side nextTick
implementation (50x faster than using an Image
error)Object.divide
will return arrays unchangedRegExp.isRegExp
Object.setPath
will now no longer replace functions with objectsdoLoaded
phase are executedPledge#handleCallback
which will handle old-style callbacksFAQs
Native object expansion library
The npm package protoblast receives a total of 249 weekly downloads. As such, protoblast popularity was classified as not popular.
We found that protoblast demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.