
Security News
Nx npm Packages Compromised in Supply Chain Attack Weaponizing AI CLI Tools
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
This gem validate the data between web page items and mobile api response.
It will validate stat pages of PRO, men, woman, boys and girls.
e.g. http://php.admin.laxpower.com/update17/binmen/rating01.php
Add this line to your application's Gemfile:
gem 'lx_data_validation'
And then execute:
$ bundle
Or install it yourself as:
$ gem install lx_data_validation
Validate the data of 2017 season (the default season)
$ compare
Validate the data of 2016 season
$ compare 16
It will generate a new folder named log under your current directory. All mismatched data will be recorded into the log files in the sub-directories
To install this gem onto your local machine, run bundle exec rake install
. To release a new version, update the version number in version.rb
, and then run bundle exec rake release
, which will create a git tag for the version, push git commits and tags, and push the .gem
file to rubygems.org.
Bug reports and pull requests are welcome on GitHub at https://github.com/[USERNAME]/data_validation.
The gem is available as open source under the terms of the MIT License.
FAQs
Unknown package
We found that lx_data_validation demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.