
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
The Upt config reader and writer.
The config spec can be read here.
Loads the upt configuration from the configuration files.
Returns a configuration value by key.
Keys with dots are supported to access deep values.
Sets a configuration value for key.
Keys with dots are supported to set deep values.
Removes configuration named key.
Keys with dots are supported to delete deep keys.
Saves changes to where.
The where argument can be a path to a configuration file or:
local to save it in the configured current working directory (defaulting to process.cwd)user to save it in the configuration file located in the home directoryReturns a deep copy of the underlying configuration object.
The returned configuration is normalised.
The object keys will be camelCase.
Obtains a instance where cwd is the current working directory (defaults to process.cwd);
var config = require('upt').create();
// You can also specify a working directory
var config2 = require('upt').create('./some/path');
Alias for:
var configObject = (new Config(cwd)).load().toJson();
Returns a new normalised config object based on config.
Object keys will be converted to camelCase.
Released under the MIT License.
FAQs
The UPT config reader and writer.
We found that upt-config demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.