
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
screwdriver-data-schema
Advanced tools
Internal data schema of Screwdriver
This contains the structure/validation for all the models/resources of Screwdriver.
It's broken down into five (5) sections:
api
- API related input/output structureconfig
- Screwdriver.yaml definitionsmodels
- Internal data resources (pipeline, job, build, collection etc.)plugins
- Plugins (datastore, executor, etc.)core
- SCM plugin related output structureThe model represents a combination of what is required to create the resource and what is possible for returning from the resource.
Each model contains eight (8) schemas:
base
- List of all available fields in the modelallKeys
- List of all fields in the modelget
- Expected return values from a GET request against this resourcecreate
- Expected input values when making a CREATE action against this resourceupdate
- Expected input values when making an UPDATE action against this resourcekeys
- List of keys that combine to represent a unique rowtableName
- Internal name of the tableindexes
- Secondary indexes to make search/lookup fasterPlease read Migrations before adding anything to the data-schema
npm install screwdriver-data-schema
npm test
Code licensed under the BSD 3-Clause license. See LICENSE file for terms.
FAQs
Internal Data Schema of Screwdriver
The npm package screwdriver-data-schema receives a total of 3,129 weekly downloads. As such, screwdriver-data-schema popularity was classified as popular.
We found that screwdriver-data-schema demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 8 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.