
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
artserve - serve up single-file SQLite artbase dbs to query metadata and images with SQL and more
Use the command line tool named - surprise, surpirse - artserve
to run a zero-config / out-of-the-box artbase server that lets
you query entire collections in single sqlite database (metadata & images) with a "serverless" web page.
Type:
$ artserve # defaults to ./artbase.db
That will start-up a (local loopback) web server running on port 3000. Open-up up the index page in your browser to get started e.g. http://localhost:3000/.
That's it.
artbase.db
Options
If you pass in a directory to artserve
the machinery will look for an artbase.db
in the directory e.g.
$ artserve moonbirds # defaults to ./moonbirds/artbase.db
$ artserve goblintown # defaults to ./goblintown/artbase.db
# ...
If you pass in a file to artserve the machinery will use the bespoke name & path to look for the sqlite database e.g.
$ artserve punkbase.db
$ artserve moonbirdbase.db
# ...
Just install the gem:
$ gem install artserve
The scripts are dedicated to the public domain. Use it as you please with no restrictions whatsoever.
Post them on the D.I.Y. Punk (Pixel) Art reddit. Thanks.
FAQs
Unknown package
We found that artserve demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.