
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
I've been struggling with the design language in our business.
When I want to refine it properly, I find myself torn between modifying individual components one by one or starting a full redesign of the entire design language.
For now, I’ve taken a middle-ground approach — I tend to use a verb to encapsulate certain components with similar behaviors, and that’s where 'Spross' comes from (it means 'sprout' in German).
I’m not deliberately using another foreign language, it’s just that registering a unique npm package is really challenging.
Similarly, I created another library called Springen.
So spross, as a design system concept, describes lightweight, contextually triggered components that dynamically grow from other elements.
Of course, I don’t want to create components that feel outdated. I want each repetition to at least be infused with new creativity. Therefore, they should either have interesting features or be a result of my rethinking of best practices.
FAQs
Spross - Interface overlays that 'sprout' from elements
We found that spross demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.