
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
ta-bulk-testing
Advanced tools
This is a project that helps you make bulk testing to twilio's autopilot infraestructure.
This cli helps with bulk tests to the Autopilot infraestructure. It uses csv file fixtures as input and returns a json report if needed.
npm install -g ta-bulk-testing
In order for this application to run, it requires you to set three twilio variables.
How to get them?:
There are three ways that the cli will try to get those variables from:
Environment variables given by the OS, with the names of ACCOUNT_SID, AUTH_TOKEN and ASSISTANT_SID.account_sid, auth_token, assistant_sid.twilio autopilot cli which is located in ~/.twilio/config.json.If any of those three places have the variables, it will raise an exception instead of running.
Now you're able to run the project in the cli.
This is a cli program that helps you make bulk testing to
twilio's autopilot infraestructure. It uses a csv file fixtures
as input and returns a json report if needed.
Usage
$ ta-bulk-testing <action>
Options
--expand, -e Take the fixtures file and expand it.
This process relies on "intent-utterance-expander"
project.
--export, -x Export report to a given name.
Eg. --export report.json.
If you send 'export' without a filename,
it will output the report in output.json.
--fixtures, -f Import an specific fixture file. CSV Format
is mandatory.
--language, -l Language for the testing. Default: 'en-US'
--account_sid, -s Twilio's account SID, default will try to
lookup for it in ~/.twilio/config.json.
--auth_token, -t Twilio's authorization token, default will
try to lookup for it in ~/.twilio/config.json.
--assistant_sid, -a Twilio's specific assistant ID for this testing.
Examples
$ ta-bulk-testing --expand --fixtures ./fixtures/en-US.csv --export
In order to generate the fixtures, this project relies on Intent Utterance Expander in order to expand the samples in your file. The first row, should be task, intent so that the library can match correctly the sample to the task that the bot should respond.
task, samples
hello_world, (Hi | Hello | Hey) I am Erick
task, samples
hello_world, Hi I am Erick
hello_world, Hello I am Erick
hello_world, Hey I am Erick
hello_world, Hey I am Erick
Note: It's suggested that you use the expander to minimize the size of your fixture file.
In the folder fixtures of this project, there's an example .csv file using the expander feature.
In case you want to add test cases that resolves as null, you should do the following:
task, samples
null, this is a samples that should not be resolved by the NLR.
In order to install it, just clone the project and install the dependencies.
git clone <repo>yarn install # I'm using yarn, but you can you npm to install the dependencies.In order to be able to run this project, you'll need to have an .env file with your credentials.
cp .env.example .envACCOUNT_SID, AUTHO_TOKEN and ASSISTANT_SID.FAQs
This is a project that helps you make bulk testing to twilio's autopilot infraestructure.
We found that ta-bulk-testing demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.