
Research
Security News
The Growing Risk of Malicious Browser Extensions
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
stylelint-processor-glamorous
Advanced tools
Lint glamorous and related css-in-js with stylelint
Supply Chain Security
Vulnerability
Quality
Maintenance
License
$ yarn add stylelint stylelint-processor-glamorous stylelint-config-standard --dev
You don't have to use the standard config. You can use
styleilint-config-recommended
or use your own cusotm config. Certain rules that enforce formatting are ignored.
Add .stylelintrc
to the root of your project.
{
"processors": ["stylelint-processor-glamorous"],
"extends": "stylelint-config-standard"
}
That's it. You can now run stylelint from the command line.
$ yarn stylelint 'src/**/*.js'
Glamorous component factories
const Component = glamorous.div({ ... });
CSS attributes
<Div css={{ ... }}/>
Annotated object literals.
export const styles =
// @css
{
...
}
The @css
comment tells the processor that its a style object. Make sure you put it right before the opening brace.
LICENSE: MIT
FAQs
Lint glamorous and related css-in-js with stylelint
The npm package stylelint-processor-glamorous receives a total of 402 weekly downloads. As such, stylelint-processor-glamorous popularity was classified as not popular.
We found that stylelint-processor-glamorous demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
Research
Security News
An in-depth analysis of credential stealers, crypto drainers, cryptojackers, and clipboard hijackers abusing open source package registries to compromise Web3 development environments.
Security News
pnpm 10.12.1 introduces a global virtual store for faster installs and new options for managing dependencies with version catalogs.