
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
$stderr
and $stdout
Please note: Version 2.0 of this gem requires Ruby 3 and IRB 1.7+
require 'fancy_irb'
FancyIrb.start
You can pass an options hash as argument. These are the default values:
DEFAULT_OPTIONS = {
:rocket_mode => true, # activate or deactivate #=> rocket
:rocket_prompt => '#=> ', # prompt to use for the rocket
:result_prompt => '=> ', # prompt to use for normal output
:colorize => { # colors hash. Set to nil to deactivate colors
:rocket_prompt => [:blue],
:result_prompt => [:blue],
:input_prompt => nil,
:irb_errors => [:red, :clean],
:stderr => [:red, :bright],
:stdout => nil,
:input => nil,
},
}
Rocket mode means: Instead of displaying the result on the next line, show it on the same line (if there is enough space)
For more information on which colors can be used, see the paint documentation.
You will need ansicon or ConEmu or WSL.
Not all methods dealing with input data are patched properly to work with the rocket,
the gem focuses on the commonly used ones, like gets
or getc
.
Inspired by the irb_rocket gem by genki.
Copyright (c) 2010-2012, 2015-2023 Jan Lelis https://janlelis.com released under the MIT license.
FAQs
Unknown package
We found that fancy_irb demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.