
Security News
Axios Supply Chain Attack Reaches OpenAI macOS Signing Pipeline, Forces Certificate Rotation
OpenAI rotated macOS signing certificates after a malicious Axios package reached its CI pipeline in a broader software supply chain attack.
If you don't know where to start - check
Webix UI library is licensed under "GPL v3" licence http://www.gnu.org/licenses/old-licenses/gpl-3.0.html
** What does it means in human terms **
You CAN'T remove this license or webix attribution from source files
You CAN modify provided code in any way which doesn't conflict with above statement
You CAN use this lib for any private projects which you do not plan to share or sell
You CAN use this lib for public projects, BUT in such case you MUST share full source code of your project
If you do not want to share sources then you need to obtain commercial license
You can buy commercial license and support subscription at http://webix.com
If you have questions about functionality of the component or have some issue with API and behavior of the component, you can get help at http://forum.webix.com
(c) XB Software Ltd. 2017
FAQs
NPM build of Webix UI Components
We found that webix-npm demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
OpenAI rotated macOS signing certificates after a malicious Axios package reached its CI pipeline in a broader software supply chain attack.

Security News
Open source is under attack because of how much value it creates. It has been the foundation of every major software innovation for the last three decades. This is not the time to walk away from it.

Security News
Socket CEO Feross Aboukhadijeh breaks down how North Korea hijacked Axios and what it means for the future of software supply chain security.