Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
vbb-tokenize-station
Advanced tools
Station names in VBB are terribly inconsistent and user's search queries are not perfect either. This module tries to compensate all the weird edge cases:
S Südkreuz Bhf (Berlin)
-> sbahn suedkreuz bahnhof berlin
S Beusselstr
-> sbahn beussel strasse
S+U Warschauer Str.
-> sbahn ubahn warschauer strasse
Charité - Campus Benjamin Franklin (Berlin)
-> charite campus benjamin franklin berlin
npm install vbb-tokenize-station
const tokenize = require('vbb-tokenize-station')
tokenize('S+U Warschauer Str.')
.join(' ') // -> 'sbahn ubahn warschauer strasse'
Called with no arguments or an invalid argument, tokenize
will return []
.
If you have a question, found a bug or want to propose a feature, have a look at the issues page.
FAQs
Make VBB station names search-safe.
The npm package vbb-tokenize-station receives a total of 28 weekly downloads. As such, vbb-tokenize-station popularity was classified as not popular.
We found that vbb-tokenize-station demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.