
Security News
Nx npm Packages Compromised in Supply Chain Attack Weaponizing AI CLI Tools
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
= ruby_is_forked
Forked Ruby process inherit some resources from parent processes, on most platforms.
For example a File opened in a parent process is visible and shared in forked children:
file = File.open("/dev/null") puts "Parent: #{$$}: #{file.object_id}" fork { puts "Child: #{$$}: #{file.object_id}" } puts "Parent after fork: #{$$}: #{file.object_id}" Thread.new { puts "Thread: #{file.object_id}" }
Sample Output:
Parent: 27282: 153210860 Child: 29777: 153210860 Parent after fork: 27282: 153210860 Thread: 153210860
Using ruby_is_forked:
require 'ruby_is_forked/process_callbacks' file = File.open("/dev/null") Process.add_callback_in_child! lambda { | pid | file = File.open("/dev/null") } puts "Parent #{$$}: #{file.object_id}" fork { puts "Child: #{$$}: #{file.object_id}" } puts "Parent after fork: #{$$}: #{file.object_id}" Thread.new { puts "Thread: #{file.object_id}" }
Sample Output:
Parent 31583: 90260550 Child: 31627: 152197900 Parent after fork: 31583: 90260550 Thread: 90260550
== Functionality
== See Also
== Contributing to ruby_is_forked
== Copyright
Copyright (c) 2011 Kurt Stephens. See LICENSE.txt for further details.
FAQs
Unknown package
We found that ruby_is_forked demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.