
Research
NPM targeted by malware campaign mimicking familiar library names
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
= K-Tree
K-Tree is a data structure that generalizes the notion of Quadtrees and Octrees. The nodes subdivides the n-dimentional space into equal subsections of 2^n k-tants (quadrants for 2-dimensional spaces, octants for 3-dimensional) down to your desired level of resolution, and during the creation allows you to decide whether or not to keep the child nodes based on your criteria for whether or not there's enough variance.
The coordinats of the midpoint of all these sections are maintained by k-tree and are therefore enumerable.
== Gem Version
{}[http://badge.fury.io/rb/k-tree]
{
}[https://travis-ci.org/flajann2/k-tree]
== Usage
== Examples
For now, I will use the spec as example of usage. This is lame, I'll admit, but I will improve this shortly.
require 'k-tree' include KTree
let(:ktree) do KTree.create do |node, vchildren| rand(3) != 5 end end
it "created a tree" do expect(ktree).to_not be_nil end
it "has nodes" do expect(ktree.root).to_not be_nil end
it "upper and lower coords are never equal" do ktree.each do |node| expect(node.upper).to_not eq node.lower end end
== Known Issues Currently K-Tree does not support "nearest neighbor" queries, as this is beyond the scope of the current needs of the author. Check out kd-tree amd r-tree for that. Or feel free to add that functionality and do a pull request.
== Contributing to k-tree
== Copyright
Copyright (c) 2014 Fred Mitchell. See LICENSE.txt for further details.
FAQs
Unknown package
We found that k-tree demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
Research
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.