
Research
/Security News
60 Malicious Ruby Gems Used in Targeted Credential Theft Campaign
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
strongly-connected-components
Advanced tools
Computes strongly connected components of a directed graph
Given a directed graph, splits it into strongly connected components.
var scc = require("strongly-connected-components")
var adjacencyList = [
[4], // 0
[0,2], // 1
[1,3], // 2
[2], // 3
[1], // 4
[4,6], // 5
[5,2], // 6
[7,6,3], // 7
]
console.log(scc(adjacencyList))
npm install strongly-connected-components
require("strongly-connected-components")(adjacencyList)
Computes the strongly connected components of a graph using Tarjan's algorithm.
adjacencyList
is an array of lists representing the directed edges of the graphReturns An object containing:
components
: an array of arrays representing the partitioning of the vertices in the graph into connected components.adjacencyList
: an array lists representing the directed edges of the directed acyclic graph between the strongly connected components(c) 2013 Mikola Lysenko. MIT License. Based on the implementation of Tarjan's algorithm on Wikipedia.
FAQs
Computes strongly connected components of a directed graph
The npm package strongly-connected-components receives a total of 234,538 weekly downloads. As such, strongly-connected-components popularity was classified as popular.
We found that strongly-connected-components demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
Research
/Security News
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.