
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
vite-plugin-debugger
Advanced tools
A vite plugin provide the debugger tools for mobile devices.
English | 中文
node version: >=20.0.0
vite version: >=6.0.0
pnpm add vite-plugin-debugger -D
# or
yarn add vite-plugin-debugger -D
# or
npm i vite-plugin-debugger -D
we use eruda with CDN by default since it's unpacked size is 2.38 MB.
import vDebugger from 'vite-plugin-debugger/eruda'
export default defineConfig(({ command, mode }) => ({
plugins: [
vDebugger({
debug: mode !== 'production',
eruda: {
// cdn: 'jsdelivr', // 'jsdelivr' | 'unpkg' | 'cdnjs' | 'staticfile'
// src: 'custom CDN URL',
options: {
tool: ['console', 'elements'],
useShadowDom: true,
autoScale: true,
defaults: {
displaySize: 50,
transparency: 0.8,
theme: 'Dark',
},
},
},
})
]
}))
Use active tools to enable eruda forcibly, you can specify activation mode and parameter name like:
const config = {
active: {
override: true, // true if you want to override debug option
mode: 'url',
param: 'debugwhatever',
}
}
For more details about eruda options, please check out eruda API.
If you prefer use eruda locally, you should install eruda and it's plugins first.
pnpm add eruda -D
# or
yarn add eruda -D
# or
npm i eruda -D
import { fileURLToPath } from 'node:url'
import vDebugger from 'vite-plugin-debugger/eruda'
const resolve = (dir: string) => fileURLToPath(new URL(dir, import.meta.url))
export default defineConfig(({ command, mode }) => ({
plugins: [
vDebugger({
debug: mode !== 'production',
local: true,
entry: resolve('src/main.ts'), // vue or src/main.tsx for react
eruda: {
options: {
tool: ['console', 'elements'],
useShadowDom: true,
autoScale: true,
defaults: {
displaySize: 50,
transparency: 0.8,
theme: 'Dark',
},
},
}
})
]
}))
we use vConsole with CDN by default since it's unpacked size is 344 kB.
import vDebugger from 'vite-plugin-debugger/vconsole'
export default defineConfig(({ command, mode }) => ({
plugins: [
vDebugger({
debug: mode !== 'production',
vConsole: {
options: {
theme: 'dark',
},
},
})
]
}))
Use active tools to enable vConsole dynamically, you can specify activation mode and parameter name like:
active: { mode: 'url', param: 'debugwhatever' },
For more details about vConsole options, please check out vConsole API.
If you prefer use vConsole locally, you should install vConsole first.
pnpm add vconsole -D
# or
yarn add vconsole -D
# or
npm i vconsole -D
import { fileURLToPath } from 'node:url'
import vDebugger from 'vite-plugin-debugger/vconsole'
const resolve = (dir: string) => fileURLToPath(new URL(dir, import.meta.url))
export default defineConfig(({ command, mode }) => ({
plugins: [
vDebugger({
debug: mode !== 'production',
local: true,
entry: resolve('src/main.ts'), // vue or src/main.tsx for react
vConsole: {
options: {
theme: 'dark',
},
},
})
]
}))
FAQs
A vite plugin provide the debugger tools for mobile devices.
The npm package vite-plugin-debugger receives a total of 93 weekly downloads. As such, vite-plugin-debugger popularity was classified as not popular.
We found that vite-plugin-debugger demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.