
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
Utilize any compression algorithm with just a single module... The compression methods that are taken care of as of now are gzip, deflate and brotli.. if any new cool methods become mainstream, we will do our best to include them...
Any version below 1.3 works using the iltorb npm module which is ideal for any node version below 11... Versions 1.3 and above use node's native zlib brotli methods and are ideal with Node.js version 11 (and above)... There is a thrown error when you attempt to use the latest version but aren't in an ideal environment to do such...
Like we need to tell you but run this...
npm install pulverized
And then you can start using the module by doing the below...
var Pulverized = require('pulverized');
Lastly, you can understand the methods and signatures of those methods if you read the below section...
This is the Pulverized singleton 'illustrated' as a tree...
Pulverized
|-- compress
| |-- async
| | |-- br ( dataToCompress, callback, brotliSettingsObject )
| | |-- df ( dataToCompress, callback, deflateSettingsObject )
| | \-- gz ( dataToCompress, callback, gzipSettingsObject )
| |
| |-- stream
| | |-- br ( brotliSettingsObject )
| | |-- df ( deflateSettingsObject )
| | \-- gz ( gzipSettingsObject )
| |
| \-- sync
| |-- br ( dataToCompress, brotliSettingsObject )
| |-- df ( dataToCompress, deflateSettingsObject )
| \-- gz ( dataToCompress, gzipSettingsObject )
|
\-- decompress
|-- async
| |-- br ( dataToDecompress, callback )
| |-- df ( dataToDecompress, callback )
| \-- gz ( dataToDecompress, callback )
|
|-- stream
| |-- br ( )
| |-- df ( )
| \-- gz ( )
|
\-- sync
|-- br ( dataToDecompress )
|-- df ( dataToDecompress )
\-- gz ( dataToDecompress )
Within all compression methods, the pulverizedSettingsObject uses the encoding parameters of the relevant algorithm deflate, gzip or brotli within the object.
The below pretty much points out what is in the examples folder... so I have each example from below in those files and more...
Pulverized["COMPRESS OR DECOMPRESS"]["ALGORITHM"].sync(
buffer /* required */,
pulverizedSettingsObject /* optional */
)
fs.writeFileSync(
"./examples/lorem-sync-l9.txt.gz",
Pulverized.compress.gz.sync(
fs.readFileSync(loremFilename,"utf8"), {
level:9
}
)
);
Pulverized["COMPRESS OR DECOMPRESS"]["ALGORITHM"].async(
buffer /* required */,
callback /* required */,
pulverizedSettingsObject /* optional */
)
Pulverized.compress.df.async(
fs.readFileSync(loremFilename,"utf8"),
function(err, output){
fs.writeFileSync(
"./examples/lorem-async-l5.txt.df",
output
);
console.log(
"df decompressed async setup",
Pulverized.decompress.df.async(
fs.readFileSync(
"./examples/lorem-async-l5.txt.df"
), function(err, output){
console.log(
"df decompressed output",
err,
output
)
}
)
);
},{
level:5
}
)
Pulverized["COMPRESS OR DECOMPRESS"]["ALGORITHM"].stream(
pulverizedSettingsObject /* optional */
)
fs.createReadStream(loremFilename)
.pipe(Pulverized.compress.br.stream({
quality:1
}))
.pipe(fs.createWriteStream("./examples/lorem-stream-q1.txt.br"));
FAQs
Utilize any compression algorithm with just a single module...
The npm package pulverized receives a total of 5 weekly downloads. As such, pulverized popularity was classified as not popular.
We found that pulverized demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.