
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
cf-component-button
Advanced tools
Cloudflare Button Component
Installation with yarn is recommended
$ yarn add cf-component-button
import React from 'react';
import { Button, ButtonGroup } from 'cf-component-button';
const ButtonComponent = () => (
<div>
<ButtonGroup>
<Button type="primary" onClick={() => console.log('Clicked One!')}>
Button One
</Button>
<Button type="default" onClick={() => console.log('Clicked Two!')}>
Button Two
</Button>
<Button type="success" onClick={() => console.log('Clicked Three!')}>
Button Three
</Button>
</ButtonGroup>
<p>Button group with spacing</p>
<ButtonGroup spaced>
<Button type="warning" onClick={() => console.log('Clicked Four!')}>
Button Four
</Button>
<Button type="danger" onClick={() => console.log('Clicked Five!')}>
Button Five
</Button>
<Button
type="danger"
disabled
onClick={() => console.log('Clicked disabled!')}
>
Disabled
</Button>
<Button
type="danger"
onClick={() => console.log('Clicked Six!')}
inverted
>
Button Six
</Button>
<Button
type="primary"
onClick={() => console.log('Clicked Seven!')}
inverted
>
Button Seven
</Button>
<Button
type="default"
loading
onClick={() => console.log('Clicked Loading!')}
>
Button Eight
</Button>
</ButtonGroup>
</div>
);
export default ButtonComponent;
FAQs
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.