toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

211
active users

#npm

13 posts12 participants3 posts today
Pyrzout :vm:<p>High-Value NPM Developers Compromised in New Phishing Campaign <a href="https://www.securityweek.com/high-value-npm-developers-compromised-in-new-phishing-campaign/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/high-value-np</span><span class="invisible">m-developers-compromised-in-new-phishing-campaign/</span></a> <a href="https://social.skynetcloud.site/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://social.skynetcloud.site/tags/SupplyChain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChain</span></a> <a href="https://social.skynetcloud.site/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://social.skynetcloud.site/tags/NPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NPM</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://aus.social/@static" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>static</span></a></span> <span class="h-card" translate="no"><a href="https://toot.community/@Noisecolor" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Noisecolor</span></a></span> TBH, <a href="https://infosec.space/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> suffers the same problems and then some as <a href="https://infosec.space/tags/AUR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AUR</span></a> and has seen it's fair share of <a href="https://infosec.space/tags/abuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>abuse</span></a> and <a href="https://infosec.space/tags/CyberVandalism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberVandalism</span></a> ranging from malicious commits to flat-out <a href="https://infosec.space/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> distribution, so it has the <a href="https://infosec.space/tags/centralization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>centralization</span></a> problem!</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://aus.social/@static" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>static</span></a></span> I think <a href="https://infosec.space/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> is just a horrible package manager in terms of <a href="https://infosec.space/tags/UX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UX</span></a>.</p>
thepwnicorn<p><a href="https://socket.dev/blog/npm-is-package-hijacked-in-expanding-supply-chain-attack" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">socket.dev/blog/npm-is-package</span><span class="invisible">-hijacked-in-expanding-supply-chain-attack</span></a><br><a href="https://infosec.exchange/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> <a href="https://infosec.exchange/tags/supplychainattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>supplychainattack</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/remoteshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remoteshell</span></a></p>
Bobbys Bytes<p>Heads up, developers! A major npm Registry security breach has compromised 847 packages. Social engineering gave attackers access to maintainer accounts. Stay vigilant!<br><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://mastodon.social/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a></p>
The New Oil<p>Popular <a href="https://mastodon.thenewoil.org/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> <a href="https://mastodon.thenewoil.org/tags/linter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linter</span></a> packages hijacked via <a href="https://mastodon.thenewoil.org/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> to drop <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/popular-npm-linter-packages-hijacked-via-phishing-to-drop-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/popular-npm-linter-packages-hijacked-via-phishing-to-drop-malware/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a></p>
Hackread.com<p>🚨 A fake npm website tricked a maintainer into giving up their token, letting attackers push malware into popular JS packages.</p><p>Details: <a href="https://hackread.com/fake-npm-website-used-push-malware-via-stolen-token/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/fake-npm-website-</span><span class="invisible">used-push-malware-via-stolen-token/</span></a></p><p><a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> <a href="https://mstdn.social/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a> <a href="https://mstdn.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mstdn.social/tags/supplychainsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>supplychainsecurity</span></a></p>
Cindʎ Xiao 🍉<p>Great analysis of the malware distributed with the esling-config-prettier NPM package compromise on Friday: <a href="https://c-b.io/2025-07-20+-+Install+Linters%2C+Get+Malware+-+DevSecOps+Speedrun+Edition" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">c-b.io/2025-07-20+-+Install+Li</span><span class="invisible">nters%2C+Get+Malware+-+DevSecOps+Speedrun+Edition</span></a></p><p>By <a href="https://bsky.app/profile/c-b.io" rel="nofollow noopener" target="_blank">c-b.io on Bluesky</a> / <a href="https://x.com/cyb3rjerry" rel="nofollow noopener" target="_blank">cyb3rjerry on Twitter</a> :D</p><p><a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> <a href="https://infosec.exchange/tags/npmsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npmsecurity</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reversing</span></a></p>
Miguel Afonso Caetano<p>"Cybersecurity researchers have alerted to a supply chain attack that has targeted popular npm packages via a phishing campaign designed to steal the project maintainers' npm tokens.</p><p>The captured tokens were then used to publish malicious versions of the packages directly to the registry without any source code commits or pull requests on their respective GitHub repositories.</p><p>The list of affected packages and their rogue versions, according to Socket, is listed below -</p><p>- eslint-config-prettier (versions 8.10.1, 9.1.1, 10.1.6, and 10.1.7)<br>- eslint-plugin-prettier (versions 4.2.2 and 4.2.3)<br>- synckit (version 0.11.9)<br>- @pkgr/core (version 0.2.8)<br>- napi-postinstall (version 0.3.1)</p><p>"The injected code attempted to execute a DLL on Windows machines, potentially allowing remote code execution," the software supply chain security firm said."</p><p><a href="https://thehackernews.com/2025/07/malware-injected-into-6-npm-packages.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/07/malw</span><span class="invisible">are-injected-into-6-npm-packages.html</span></a></p><p><a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/NPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NPM</span></a> <a href="https://tldr.nettime.org/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a> <a href="https://tldr.nettime.org/tags/Node" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Node</span></a> <a href="https://tldr.nettime.org/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> <a href="https://tldr.nettime.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://tldr.nettime.org/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a></p>
Sasha<p>There was an attempt to put malware into the eslint-config-prettier package. Be careful out there peeps.</p><p><a href="https://github.com/prettier/eslint-config-prettier/issues/339#issuecomment-3090199603" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/prettier/eslint-con</span><span class="invisible">fig-prettier/issues/339#issuecomment-3090199603</span></a></p><p><a href="https://hachyderm.io/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> <a href="https://hachyderm.io/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://hachyderm.io/tags/eslint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eslint</span></a></p>
Socket<p>🚨 Active supply chain attack on npm: <br>Multiple Prettier tooling packages were compromised through the phishing campaign we published about just hours ago. Watch out for more compromised accounts and malicious packages. </p><p>Follow-up: <a href="https://socket.dev/blog/npm-phishing-campaign-leads-to-prettier-tooling-packages-compromise" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">socket.dev/blog/npm-phishing-c</span><span class="invisible">ampaign-leads-to-prettier-tooling-packages-compromise</span></a> <a href="https://fosstodon.org/tags/nodejs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nodejs</span></a> <a href="https://fosstodon.org/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a></p>
Christoffer S.<p>NPM continues to be an attractive target for threat actors. These are the most common attack vectors:</p><p>1. Typosquatting: Mimicking popular packages (e.g., web3-wrapper-ethers vs ethers) [1]</p><p>2. Package Impersonation: Creating near-identical copies of legitimate libraries [2]</p><p>3. Legitimate Package Compromise: Hijacking established packages (eslint-config-prettier) [3]</p><p>4. Malicious Pull Requests: Introducing dependencies via seemingly legitimate contributions [4]</p><p>5. Phishing: Credential theft using typosquatted domains (npnjs.com) [5]</p><p>## References</p><p>[1] <a href="https://www.aikido.dev/blog/malicious-package-web3" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">aikido.dev/blog/malicious-pack</span><span class="invisible">age-web3</span></a><br>[2] <a href="https://socket.dev/blog/north-korean-contagious-interview-campaign-drops-35-new-malicious-npm-packages" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">socket.dev/blog/north-korean-c</span><span class="invisible">ontagious-interview-campaign-drops-35-new-malicious-npm-packages</span></a><br>[3] <a href="https://www.stepsecurity.io/blog/supply-chain-security-alert-eslint-config-prettier-package-shows-signs-of-compromise" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">stepsecurity.io/blog/supply-ch</span><span class="invisible">ain-security-alert-eslint-config-prettier-package-shows-signs-of-compromise</span></a><br>[4] <a href="https://www.reversinglabs.com/blog/malicious-pull-request-infects-vscode-extension" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">reversinglabs.com/blog/malicio</span><span class="invisible">us-pull-request-infects-vscode-extension</span></a><br>[5] <a href="https://socket.dev/blog/npm-phishing-email-targets-developers-with-typosquatted-domain" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">socket.dev/blog/npm-phishing-e</span><span class="invisible">mail-targets-developers-with-typosquatted-domain</span></a></p><p><a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://swecyb.com/tags/NPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NPM</span></a> <a href="https://swecyb.com/tags/SupplyChain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChain</span></a></p>
nemo™ 🇺🇦<p>🚨 North Korean hackers unleashed 67 malware-ridden packages on npm in their ongoing "Contagious Interview" campaign, spreading the XORIndex loader to steal data &amp; FckCrypto 🕵️‍♂️💻 Over 17,000 downloads caught in this supply chain attack! Stay vigilant &amp; verify packages carefully! <a href="https://mas.to/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mas.to/tags/NPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NPM</span></a> <a href="https://mas.to/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mas.to/tags/SupplyChainAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainAttack</span></a></p><p>Read more: <a href="https://www.techradar.com/pro/security/north-korean-hackers-release-malware-ridden-packages-into-npm-registry" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/nor</span><span class="invisible">th-korean-hackers-release-malware-ridden-packages-into-npm-registry</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
The New Oil<p>North Korean <a href="https://mastodon.thenewoil.org/tags/XORIndex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XORIndex</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> hidden in 67 malicious <a href="https://mastodon.thenewoil.org/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> packages</p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-xorindex-malware-hidden-in-67-malicious-npm-packages/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/north-korean-xorindex-malware-hidden-in-67-malicious-npm-packages/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NorthKorea</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/North" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>North</span></a> <a href="https://infosec.exchange/tags/Korea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Korea</span></a>-linked actors spread <a href="https://infosec.exchange/tags/XORIndex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XORIndex</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> via 67 malicious <a href="https://infosec.exchange/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> packages<br><a href="https://securityaffairs.com/179950/hacking/north-korea-linked-actors-spread-xorindex-malware-via-67-malicious-npm-packages.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/179950/hac</span><span class="invisible">king/north-korea-linked-actors-spread-xorindex-malware-via-67-malicious-npm-packages.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
洪 民憙 (Hong Minhee)<p>Introducing <a class="mention hashtag" rel="nofollow noopener" href="https://hollo.social/tags/Upyo" target="_blank">#<span>Upyo</span></a>!</p><p>A simple, cross-runtime email library that works seamlessly on <a class="mention hashtag" rel="nofollow noopener" href="https://hollo.social/tags/Deno" target="_blank">#<span>Deno</span></a>, <a class="mention hashtag" rel="nofollow noopener" href="https://hollo.social/tags/Node" target="_blank">#<span>Node</span></a>.js, <a class="mention hashtag" rel="nofollow noopener" href="https://hollo.social/tags/Bun" target="_blank">#<span>Bun</span></a>, and edge functions. Zero dependencies, unified API, and excellent testability with built-in mock transport.</p><p>Switch between <a class="mention hashtag" rel="nofollow noopener" href="https://hollo.social/tags/SMTP" target="_blank">#<span>SMTP</span></a>, <a class="mention hashtag" rel="nofollow noopener" href="https://hollo.social/tags/Mailgun" target="_blank">#<span>Mailgun</span></a>, <a class="mention hashtag" rel="nofollow noopener" href="https://hollo.social/tags/SendGrid" target="_blank">#<span>SendGrid</span></a> without changing your code. Available on <a class="mention hashtag" rel="nofollow noopener" href="https://hollo.social/tags/JSR" target="_blank">#<span>JSR</span></a> &amp; <a class="mention hashtag" rel="nofollow noopener" href="https://hollo.social/tags/npm" target="_blank">#<span>npm</span></a>!</p><p><a href="https://upyo.org/" rel="nofollow noopener" target="_blank">https://upyo.org/</a></p>
Lukas Kahwe Smith<p>When contributing to <a href="https://mastodon.green/tags/PHP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PHP</span></a> <a href="https://mastodon.green/tags/OSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSS</span></a> dependencies, I usually used "composer --prefer-source" to get the dependencies installed as git repos.This way, when I make modifications, I can test them inside a larger codebase immediately while easily being able to check my changes and commit+push them upstream.</p><p>What is the process for <a href="https://mastodon.green/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a>? Is there a similar pattern with <a href="https://mastodon.green/tags/NPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NPM</span></a>? Or what is the approach JavaScript OSS contributors take?</p>
Nick Escobar<p>Install 'steploop', with npm:<br><a href="https://www.npmjs.com/package/steploop" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">npmjs.com/package/steploop</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/steploop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>steploop</span></a> <a href="https://infosec.exchange/tags/typescript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>typescript</span></a> <a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javascript</span></a> <a href="https://infosec.exchange/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a></p>
Nick Escobar<p>To see ‘steploop’ in action, visit the demo page.</p><p>Demo page: <a href="https://nickesc.github.io/steploop/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nickesc.github.io/steploop/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/steploop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>steploop</span></a> <a href="https://infosec.exchange/tags/typescript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>typescript</span></a> <a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javascript</span></a> <a href="https://infosec.exchange/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a></p>
Nick Escobar<p>Today, I released 'steploop', a TypeScript/JavaScript package that provides a fully-featured main-loop which acts as a strong foundation for building loops that execute at a consistent, specified rate. It is inspired by game engine main-loops like Godot's MainLoop or Unity's Update() loop.</p><p>Source code: <a href="https://github.com/nickesc/steploop" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/nickesc/steploop</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/steploop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>steploop</span></a> <a href="https://infosec.exchange/tags/typescript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>typescript</span></a> <a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javascript</span></a> <a href="https://infosec.exchange/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a></p>