
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
This gem contains Influitive specific rubocop cops. To use them you can do this
in your Gemfile
for a project:
group :development to
gem 'rubocop', require: false
gem 'rubocop-infl', require: false
end
And add this to your .rubocop.yml
for the project:
require: "rubocop-infl"
It is considered good style to limit the length of lines in Ruby source code, and we have found that sometimes there are lines which are a little longer than our conventional limit and breaking up made the code less readable and "greppable". This Cop attempts to help with that situation by allowing a file to have up to a certain percentage of the lines be longer than our "usual" limit.
Metrics/LineLength:
Enabled: false
Infl/SoftLineLength:
Enabled: true
SoftLimit: 80
HardLimit: 120
AllowedLongLinePercentage: 2
This would complain about any lines which were longer than 120 characters, and allow up to 2% of lines in a file to be longer than 80 characters before starting to complain about the lines longer that 80 characters.
Shamelessly based on https://github.com/backus/rubocop-rspec
http://rubocop.readthedocs.io/en/latest/extensions/#custom-cop has more information on custom cops.
This is licensed under the MIT License
FAQs
Unknown package
We found that rubocop-infl demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.