
Security News
Axios Maintainer Confirms Social Engineering Attack Behind npm Compromise
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.
Convert Pug and Jade templates to their corresponding handlebars version.
npm install -g pug2hbs
Usage: pug2hbs [path...]
Options:
-h, --help output usage information
-V, --version output the version number
-o, --out <destination> destination folder (defaults to current directory)
*.jade files specified at path argument will be transformed to *.hbs files.
Transform all *.jade files in current directory to *.hbs files at the same directory.
$ pug2hbs
Transform all *.jade files in current directory to *.hbs files at directory ./hbs-templates.
$ pug2hbs -o ./hbs-templates
Transform ./jade-templates/index.jade file to *.hbs file at directory ./hbs-templates.
$ pug2hbs -o ./hbs-templates ./jade-templates/index.jade
Transform all *.jade files of ./jade-templates directory to *.hbs files at the same directory.
$ pug2hbs ./jade-templates
Transform multiple *.jade files to *.hbs files at directory ./hbs-templates.
$ pug2hbs -o ./hbs-templates ./jade-templates ./other/about.jade ./another/some-file.jade
For features that can't be translated from jade to handlebars a comment will be inserted, for example <!-- TODO: Fix unsupported jade mixin -->.
FAQs
Convert Pug and Jade templates to Handlebars
We found that pug2hbs demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.