Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
seneca-log-filter
Advanced tools
A Seneca.js Log Filter Module
var LogFilter = require('seneca-log-filter')
var filter = LogFilter({'omit-metadata': true, level: 'info' })
var obj = {level: 'info', foo: 'test', bar: 'test' }
var filteredObj = filter(obj)
// filteredObj is equal to {foo: 'test', bar: 'test' }
LogFilter(config)
config
is an object which can take several properties which change the behaviour of the filter which are listed below.
level
a required property which states the log level to filter outomit-metadata
a value which can be true or false, if true this omits the properties with the names seneca
, level
and when
when filtering an objectomit
an array of strings of names of properties to omit when filtering an objectA function which can be called on an object to filter properties out of it.
npm test
This module follows the general Senecajs org contribution guidelines, and encourages open participation. If you feel you can help in any way, or discover any Issues, feel free to create an issue or create a pull request!
If you wish to read more on our guidelines, feel free to
Copyright (c) 2016, David Gonzalez. Licensed under MIT.
FAQs
Seneca log filtering module
The npm package seneca-log-filter receives a total of 349 weekly downloads. As such, seneca-log-filter popularity was classified as not popular.
We found that seneca-log-filter demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.