
Research
lightning PyPI Package Compromised in Supply Chain Attack
Socket detected a malicious supply chain attack on PyPI package lightning versions 2.6.2 and 2.6.3, which execute credential-stealing malware on import.
purescript-recompose
Advanced tools
A PureScript interface to recompose, a “React utility belt for functional components and higher-order components”. Recompose provides a great way to access React’s features in a more functional way, and it defines many useful higher-order components for easy composition.
purescript-recompose API documentationrecompose API documentationInstall with bower:
$ bower install --save purescript-recompose
Compose with your existing components:
newTodo :: ReactClass Unit
newTodo = withHandlers handlers $ myComponent
where handlers = { addTodo }
type HandleAdd props eff =
{ add :: String -> Eff eff Unit | props } ->
{ target :: { value :: String } } ->
Eff eff Unit
addTodo :: forall props eff. HandleAdd props eff
addTodo props event = props.add event.target.value
In this example, myComponent is an existing React component. newTodo is the resulting component after wrapping it with recompose’s withHandlers higher-order component.
MIT
FAQs
PureScript bindings for acdlite/recompose using purescript-react
We found that purescript-recompose demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Socket detected a malicious supply chain attack on PyPI package lightning versions 2.6.2 and 2.6.3, which execute credential-stealing malware on import.

Research
A brand-squatted TanStack npm package used postinstall scripts to steal .env files and exfiltrate developer secrets to an attacker-controlled endpoint.

Research
Compromised SAP CAP npm packages download and execute unverified binaries, creating urgent supply chain risk for affected developers and CI/CD environments.