
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
Okay okay stackly is like nothing you've seen EVER! Have it even happened to you that you're doing something and then a new activity pops up and you have to do that and when you finish it you start wondering what the hell I was doing before it? Okay as programmers we know that the best answer to this is a stack... and well stackly is exactly a stack that you use to say what you were doing!
% npm install -g stackly
Imagine you're doing activity A, you have to say that to stably buy pushing to it's stack:
% stackly push
Let's you add to the stack, Now activity B happens, You push the B to the stack and then you do the B, when the B is done you do:
% stackly pop
And then you use the stackly command without any args:
% stackly
to see what you were doing. And it gives you a stack as:
% stackly
1 ✣ A
And then you know that you have to do A. Just that simple.
And if you wanted to reset the whole thing use:
% stackly clean
FAQs
A stack based 'what you were doing' tool!
We found that stackly demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.