
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
rtm-cli-plugin-example
Advanced tools
This repository can be used to serve as a template for creating a command plugin for rtm-cli.
This example is set up as a Node module that will export two commands: hello and settings.
Each command lives as a separtate file (hello.js and settings.js, respectively) and are
exported together by the index.js file, which serves as the main entry point for the
entire Node module.
This example command shows how to set up and use a required argument, an optional list argument, and an optional flag value with the command.
This example command shows how to obtain the authenticated RTM User instance and how to use this instance to make RTM API requests.
For more information on the plugin architecture installing a plugin, see the rtm-cli Wiki.
FAQs
RTM Plugin - Example
The npm package rtm-cli-plugin-example receives a total of 3 weekly downloads. As such, rtm-cli-plugin-example popularity was classified as not popular.
We found that rtm-cli-plugin-example demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.