
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
A tool to scaffold new projects, simple enough that you would want to define your own skeletons (aka generators).
A tool to scaffold new projects, simple enough that you would want to define your own skeletons (aka generators).
Document site: https://makes.js.org
"makes" is designed to be used without any installation, as long as you have Node.js. To run "makes", do:
npx makes <skeleton_provider>
aurelia/new npx makes aureliadumberjs/new npx makes dumberjsmakesjs/demo1 npx makes makesjs/demo1makesjs/demo2 npx makes makesjs/demo2Try dumberjs skeleton to create various types of front-end projects. dumberjs is a JavaScript bundler using AMD module format for front-end SPA apps.
npx makes dumberjs
# or
npx makes dumberjs my-project
Note npx makes dumberjs is a conventional short-cut of npx makes dumberjs/new.
FAQs
A tool to scaffold new projects, simple enough that you would want to define your own skeletons (aka generators).
The npm package makes receives a total of 44 weekly downloads. As such, makes popularity was classified as not popular.
We found that makes demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.