
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
seerbook-cli
Advanced tools
The SeerBook command line interface.
Install this globally and you'll have access to the seerbook command anywhere on your system.
$ npm install -g seerbook-cli
Note: The purpose of the seerbook command is to load and run the version of SeerBook you have specified in your book (or the latest one), irrespective of its version. The GitBook CLI only support versions >=2.0.0 of GitBook.
seerbook-cli store SeerBook's versions into ~/.seerbook, you can set the SEERBOOK_DIR environment variable to use another directory.
$ npm install -g seerbook-cli
Run command seerbook build, seerbook serve).
List all available commands using:
$ seerbook help
By default, SeerBook CLI will read the seerbook version to use from the book configuration, but you can force a specific version using --seerbook option:
$ seerbook build ./mybook --seerbook=2.0.1
and list available commands in this version using:
$ seerbook help --seerbook=2.0.1
List installed versions:
$ seerbook ls
List available versions on NPM:
$ seerbook ls-remote
Install a specific version:
$ seerbook fetch 2.1.0
# or a pre-release
$ seerbook fetch beta
Update to the latest version
$ seerbook update
Uninstall a specific version
$ seerbook uninstall 2.0.1
Use a local folder as a SeerBook version (for developement)
$ seerbook alias ./myseerbook latest
FAQs
CLI to generate books and documentation using seerbook
We found that seerbook-cli demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.