
Research
/Security News
Trivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets
Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.
underpost
Advanced tools
npm install -g underpost
underpost new app-name
After template installation, the server will be running on http://localhost:4001
cd app-name
Build client bundle
npm run build
Run dev client server
npm run dev
underpost [options] [command]Options:
-V, --version output the version number
-h, --help display help for command
Commands:
new [options] [app-name] Initializes a new Underpost project, service, or configuration.
start [options] <deploy-id> [env] Initiates application servers, build pipelines, or other defined services based on the deployment ID.
clone [options] <uri> Clones a specified GitHub repository into the current directory.
pull [options] <path> <uri> Pulls the latest changes from a specified GitHub repository.
cmt [options] [path] [commit-type] [module-tag] [message] Manages commits to a GitHub repository, supporting various commit types and options.
push [options] <path> <uri> Pushes committed changes from a local repository to a remote GitHub repository.
env [deploy-id] [env] [subConf] Sets environment variables and configurations related to a specific deployment ID.
static [options] Manages static build of page, bundles, and documentation with comprehensive customization options.
config [options] <operator> [key] [value] Manages Underpost configurations using various operators.
root Displays the root path of the npm installation.
ip [options] [ips] Displays the current public machine IP addresses.
cluster [options] [pod-name] Manages Kubernetes clusters, defaulting to Kind cluster initialization.
deploy [options] [deploy-list] [env] Manages application deployments, defaulting to deploying development pods.
secret [options] <platform> Manages secrets for various platforms.
image [options] Manages Docker images, including building, saving, and loading into Kubernetes clusters.
install Quickly imports Underpost npm dependencies by copying them.
db [options] [deploy-list] Manages database operations with support for MariaDB and MongoDB, including import/export, multi-pod targeting, and Git integration.
metadata [options] [deploy-id] [host] [path] Manages cluster metadata operations, including import and export.
cron [options] [deploy-list] [job-list] Manages cron jobs: execute jobs directly or generate and apply K8s CronJob manifests.
fs [options] [path] Manages file storage, defaulting to file upload operations.
test [options] [deploy-list] Manages and runs tests, defaulting to the current Underpost default test suite.
monitor [options] <deploy-id> [env] Manages health server monitoring for specified deployments.
ssh [options] Manages SSH credentials and sessions for remote access to cluster nodes or services.
run [options] <runner-id> [path] Runs specified scripts using various runners.
lxd [options] Manages LXD containers and virtual machines.
baremetal [options] [workflow-id] Manages baremetal server operations, including installation, database setup, commissioning, and user management.
help [command] display help for command
FAQs
pwa api rest template
The npm package underpost receives a total of 614 weekly downloads. As such, underpost popularity was classified as not popular.
We found that underpost demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
/Security News
Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.

Security News
ENISA’s new package manager advisory outlines the dependency security practices companies will need to demonstrate as the EU’s Cyber Resilience Act begins enforcing software supply chain requirements.

Research
/Security News
We identified over 20 additional malicious extensions, along with over 20 related sleeper extensions, some of which have already been weaponized.