Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
string.fromcodepoint
Advanced tools
A robust & optimized `String.fromCodePoint` polyfill, based on the ECMAScript 6 specification.
String.fromCodePoint
polyfill An robust & optimized ES3-compatible polyfill for the String.fromCodePoint
method in ECMAScript 6.
Other polyfills for String.fromCodePoint
are available:
In a browser:
<script src="fromcodepoint.js"></script>
Via npm:
npm install string.fromcodepoint
Then, in Node.js:
require('string.fromcodepoint');
// On Windows and on Mac systems with default settings, case doesn’t matter,
// which allows you to do this instead:
require('String.fromCodePoint');
A polyfill + test suite for String.prototype.codePointAt
is available, too.
The tests for this repository are now used by Mozilla, to help ensure their native String.fromCodePoint
implementation is correct.
Mathias Bynens |
This polyfill is available under the MIT license.
v0.2.0 - 2014-04-10
RangeError
s due to maximum call stack size #1
177fc9f
fromCodePoint
property non-enumerable d635a7c
d3098dc
Object.defineProperty
23ee503
2a010ab
31b41b3
dd1ca34
String.prototype.codePointAt
polyfill 7dc1b58
-0
02764aa
require
instructions 57bc578
02c8ae5
579503e
a018a18
5034e15
FAQs
A robust & optimized `String.fromCodePoint` polyfill, based on the ECMAScript 6 specification.
We found that string.fromcodepoint demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.