
Product
Announcing Socket Certified Patches: One-Click Fixes for Vulnerable Dependencies
A safer, faster way to eliminate vulnerabilities without updating dependencies
gabba
Advanced tools
Simple class to send custom server-side events to Google Analytics
Heavily influenced by the http://code.google.com/p/serversidegoogleanalytics
Gabba::Gabba.new("UT-1234", "mydomain.com").page_view("something", "track/me")
Gabba::Gabba.new("UT-1234", "mydomain.com").event("Videos", "Play", "ID", "123", true)
gabba = Gabba::Gabba.new("UT-1234", "mydomain.com")
# grab the __utma and (optionally) __utmz unique identifiers
gabba.identify_user(cookies[:__utma], cookies[:__utmz])
# trigger actions as normal
gabba.page_view("something", "track/me")
# Index: 1 through 50
index = 1
# Scope: VISITOR, SESSION or PAGE
scope = Gabba::Gabba::VISITOR
# Set var
gabba.set_custom_var(index, 'Name', 'Value', scope)
# Track the event (all vars will be included)
gabba.event(...)
# Track the page view (all vars will be included)
gabba.page_view(...)
# Index: 1 through 50
index = 1
# Delete var with this index
gabba.delete_custom_var index
g = Gabba::Gabba.new("UT-6666", "myawesomeshop.net")
g.transaction("123456789", "1000.00", 'Acme Clothing', '1.29', '5.00', 'Los Angeles', 'California', 'USA')
FAQs
Unknown package
We found that gabba demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
A safer, faster way to eliminate vulnerabilities without updating dependencies

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.