
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
Watir implementation built on WebDriver's Ruby bindings. See introduction mail.
require 'watir-webdriver'
browser = Watir::Browser.new :firefox
browser.goto "http://google.com"
browser.text_field(name: 'q').set("WebDriver rocks!")
browser.button(name: 'btnG').click
puts browser.url
browser.close
The majority of element methods Watir provides with is autogenerated from specifications. This is done by extracting the IDL parts from the spec and processing them with the WebIDL gem (link below). Currently supported specifications are:
lib/watir-webdriver/elements/html_generated.rb
)lib/watir-webdriver/elements/svg_generated.rb
)watir-webdriver uses watirspec for testing. After cloning, you should fetch the submodule:
git submodule init && git submodule update
Specs specific to watir-webdriver are found in spec/*_spec.rb
, with watirspec in spec/watirspec/
.
watir-webdriver uses yard-doctest for testing documentation examples.
rake yard:doctest
Copyright (c) 2009-2015 Jari Bakken. See LICENSE for details.
FAQs
Unknown package
We found that watir-webdriver demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.