
Security News
Risky Biz Podcast: Making Reachability Analysis Work in Real-World Codebases
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
show things about yangjunye
npm install yangjunye -g
$ yangjunye -h # see help
$ yangjunye resume --type=doc --out-path=. # 输出 doc 格式到当前目录
$ yangjunye show --full
$ yangjunye show --short
$ yangjunye site # 打开我的主页
$ yangjunye phone
$ yangjunye address
$ yangjunye wechat
可以输出各种格式(txt/md/html/doc/pdf)的简历到指定目录,默认输出 pdf 格式到当前目录下,名称默认为yangjunjun.pdf
Usage: yangjunye-resume --type=[doc|pdf|txt] --output=[foldpath] --name=[filename]
Options:
-t, --type [type] the type of output file (default: pdf)
-o, --output [path] the path of output file (default: .)
-n, --name [name] the name of output file (default: yangjunye)
-h, --help output usage information
Examples:
# 默认,输出 yangjunye.pdf 到 当前目录
$ yangjunye resume
# 使用选项,输出 yjy.doc 到 当前目录下 download 目录
$ yangjunye resume --type=doc --output=./download --name=yjy
# 简写选项,输出 yjy.doc 到 当前目录下 download 目录
$ yangjunye resume -t doc -o ./download -n yjy
# 数组选项,输出 yjy.doc, yjy.pdf 到 当前目录下
$ yangjunye resume --type=doc,pdf --name=yjy
# 输出 所有类型文件 到 当前目录下
$ yangjunye resume --type=all
FAQs
yangjunjun'resume
We found that yangjunye demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.