
Security News
Nx npm Packages Compromised in Supply Chain Attack Weaponizing AI CLI Tools
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
The trepanning debugger gdb-like debugger. As such, it is both a high-level and low-level debugger. It is a also a rewrite of ruby-debug. But to provide all of the functionality that it has, it requires a patched version of MRI Ruby 2.1.5, 1.9.3 or 1.9.2 found the ruby-debugger-runtime project. The additional run-time support in the MRI is what gives this powerful features that you won't find in other MRI 2.1 or 1.9 debuggers that don't use this runtime.
See the installation instructions.
There is a google group mailing list for Ruby debuggers.
If trepanning is installed, here is how to run:
$ trepan ruby-program [program]
If your program needs options of its own:
$ trepan -- ruby-program [program args...]
If you want to run from the source tree you can do that too:
cd place-where-trepan-is-installed
./bin/trepan -- ruby-program [program args...]
Running from inside irb:
require 'trepanning'
Trepan.debug { your code }
The return value from Trepan is the return value of the block, i.e. the final value in the block.
You can run the same thing inside your Ruby program, but probably you don't want to give a block. Instead, you may want to have debugging start on the next statement in the code:
require 'trepanning'
...
debugger # stop here
There is extensive on-line help, much in markdown format that displays nicely in a terminal. Run help
inside the debugger.
FAQs
Unknown package
We found that trepanning demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.