
Research
/Security News
60 Malicious Ruby Gems Used in Targeted Credential Theft Campaign
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
A Datasette plugin that adds UI elements to edit, insert, or delete rows in SQLite tables.
This plugin requires the alpha version of Datasette 1.0. You can install it with:
pip install datasette==1.0a3
After that, you can install this plugin in the same environment as Datasette.
datasette install datasette-write-ui
Once installed, the new UI elements will appear on the table page. You'll need special permission in order to see them. The easiest way is to use the root user, or otherwise use a custom actor.
If you actor has the insert-row
permissions, you'll see the "Insert new row" button at the bottom of the page.
If your actor has the update-row
permissions, you'll see a new "Edit row" option in a new menu on each row.
If your actor has the delete-row
permissions, you'll see a new "Delete row" option in a new menu on each row.
To set up this plugin locally, first checkout the code. Then create a new virtual environment:
cd datasette-write-ui
python3 -m venv venv
source venv/bin/activate
Now install the dependencies and test dependencies:
pip install -e '.[test]'
To install the JavaScript build dependencies, run this:
npm install
You can use the Just command runner to build the TypeScript to minified JavaScript like this:
just js
To run the tests:
pytest
FAQs
Unknown package
We found that datasette-write-ui demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
Research
/Security News
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.