Security News
The Dark Side of Open Source
At Node Congress, Socket CEO Feross Aboukhadijeh uncovers the darker aspects of open source, where applications that rely heavily on third-party dependencies can be exploited in supply chain attacks.
webgl-constants
Advanced tools
Complete set of constants as specified in the WebGL, WebGL2 and extension spec.
Readme
Complete set of constants as specified in the WebGL, WebGL2 and extension spec.
All constants have their original names prefixed with GL_
in order to namespace the constants and were directly ported from the documentation on the Mozilla Developer Network. In some cases the documentation describes duplicate cases such as UNSIGNED_BYTE
as both a data
type as well as a pixel
type. For that reason I've decided to prefix each with their type resulting in GL_DATA_UNSIGNED_BYTE
and GL_PIXEL_UNSIGNED_BYTE
.
My work is released under the MIT license.
FAQs
Complete set of constants as specified in the WebGL, WebGL2 and extension spec.
The npm package webgl-constants receives a total of 179,130 weekly downloads. As such, webgl-constants popularity was classified as popular.
We found that webgl-constants demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
At Node Congress, Socket CEO Feross Aboukhadijeh uncovers the darker aspects of open source, where applications that rely heavily on third-party dependencies can be exploited in supply chain attacks.
Research
Security News
The Socket Research team found this npm package includes code for collecting sensitive developer information, including your operating system username, Git username, and Git email.
Security News
OpenJS is warning of social engineering takeovers targeting open source projects after receiving a credible attempt on the foundation.