
Research
/Security News
Intercom’s npm Package Compromised in Ongoing Mini Shai-Hulud Worm Attack
Compromised intercom-client@7.0.4 npm package is tied to the ongoing Mini Shai-Hulud worm attack targeting developer and CI/CD secrets.
react-navigation-drawer
Advanced tools
Drawer navigator for use on iOS and Android.
Open a Terminal in the project root and run:
yarn add react-navigation-drawer
If you are using Expo, you are done. Otherwise, continue to the next step.
Install and link react-native-gesture-handler and react-native-reanimated. To install and link them, run:
yarn add react-native-reanimated react-native-gesture-handler
react-native link react-native-reanimated
react-native link react-native-gesture-handler
IMPORTANT: There are additional steps required for react-native-gesture-handler on Android after running react-native link react-native-gesture-handler. Check the this guide to complete the installation.
import { createDrawerNavigator } from 'react-navigation-drawer';
export default createDrawerNavigator({
Inbox: InboxStack
Drafts: DraftsStack,
}, {
initialRouteName: 'Inbox',
contentOptions: {
activeTintColor: '#e91e63',
},
});
yarn in the root directory and in the example directoryyarn dev in the root directoryyarn start in the example directoryDocumentation can be found on the React Navigation website.
FAQs
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
/Security News
Compromised intercom-client@7.0.4 npm package is tied to the ongoing Mini Shai-Hulud worm attack targeting developer and CI/CD secrets.

Research
Socket detected a malicious supply chain attack on PyPI package lightning versions 2.6.2 and 2.6.3, which execute credential-stealing malware on import.

Research
A brand-squatted TanStack npm package used postinstall scripts to steal .env files and exfiltrate developer secrets to an attacker-controlled endpoint.