
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
#fuckitruby
Tired of NameError
? Tired of the lack of AI? Tired of ruby-not-being-a-grammar-nazi?
Fuck it, ruby, that's not what I meant!
def lala(explicit)
if exlicit
do_something_stupid
else
explicit
end
end
/home/penka-was-abducted/lala.rb:2:in `lala': undefined local variable or method `exlicit' for main:Object (NameError)
from /home/penka-was-abducted/lala.rb:9:in `<main>'
ohh
require 'fuckitruby'
def lala...
fix in 'lala': 'exlicit' to
'explicit' [ENTER]
other name [type it]
fix explicit to exlicit [!] [ENTER]
> # entering
# program rewrites itself and reexecutes properly
##faq
why
it's fun.
it's "a program can self-heal itself on error conditions" little experiment
srsly?
well it's not for production use , but it combines several really cool hacks
it looks for the local variables in the offending scope using binding_of_caller,
it uses lewenstein distance to find the most probable fix, thanks hotwater
it uses parser to find the exact locations of name uses in the method
it uses colorize to color the output
uh it's inspired by magnificient thefuck command
it's an obvious nod to thefuck
command.
##kk
Copyright (c) 2015 Alexander Ivanov under the MIT License. See LICENSE for further details.
FAQs
Unknown package
We found that fuckitruby demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.