
Research
Supply Chain Attack on Axios Pulls Malicious Dependency from npm
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.
react-social-share
Advanced tools
Simple React components for social (Facebook, Twitter and Pinterest and more) buttons and counts.
npm install react-social --save
import { FacebookButton, FacebookCount } from "react-social";
class App {
render {
let url = "https://github.com";
return (
<FacebookButton url={url}>
<FacebookCount url={url} />
{" Share " + url}
</FacebookButton>
);
}
}
Change the element the component renders into, default is span.
The url you want to get the count of, default is window.location.
Return the social count.
Change the element the component renders into, default is button.
The url you want to share, default is window.location.
A message that's prepended before the url, works only with FacebookButton and TwitterButton.
Url of an image, is required for PinterestButton and only works with PinterestButton.
There are no styles included, the components pass all their props down
to their element like className and style so you can easily style
them yourself.
When rendered server side all counts will be 0 since they depend on jsonp.
MIT Licensed
FAQs
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.

Security News
TeamPCP is partnering with ransomware group Vect to turn open source supply chain attacks on tools like Trivy and LiteLLM into large-scale ransomware operations.