Installations
npm install @emerson-eps/eslint-config
Developer Guide
Typescript
No
Module System
CommonJS
Node Version
18.20.5
NPM Version
10.8.2
Score
43.3
Supply Chain
82
Quality
85.6
Maintenance
100
Vulnerability
93.9
License
Releases
Contributors
Languages
JavaScript (91.94%)
TypeScript (8.06%)
Developer
emerson-eps
Download Statistics
Total Downloads
158,337
Last Day
73
Last Week
1,205
Last Month
9,751
Last Year
63,949
GitHub Statistics
3 Stars
180 Commits
3 Forks
6 Watching
10 Branches
6 Contributors
Package Meta Information
Latest Version
7.0.7
Package Id
@emerson-eps/eslint-config@7.0.7
Unpacked Size
13.40 kB
Size
4.39 kB
File Count
5
NPM Version
10.8.2
Node Version
18.20.5
Publised On
26 Nov 2024
Total Downloads
Cumulative downloads
Total Downloads
158,337
Last day
-82.5%
73
Compared to previous day
Last week
-48%
1,205
Compared to previous week
Last month
184.6%
9,751
Compared to previous month
Last year
23.8%
63,949
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Dependencies
11
Peer Dependencies
3
Shared ESLint Config
This is the home of the shared E&P Software ESLint configs. The default config should be used for all React Typescript projects in E&P Software.
Usage
The ESLint config and Prettier config must both be added to get the full shared configuration.
(1) Install the shared Prettier and ESLint configs
1npm install --save-dev @emerson-eps/prettier-config @emerson-eps/eslint-config
If you have not already installed prettier
and eslint
install those as well:
1npm install --save-dev prettier eslint
(2) Configure Prettier
Add @emerson-eps/prettier-config
to your .prettierrc.js
:
1module.exports = { 2 ...require("@emerson-eps/prettier-config"), 3};
For more advanced setups, including how to override settings, see the instructions in the @emerson-eps/prettier-config repository.
(3) Configure ESLint
Specify the package in the extends
section of your ESLint configuration:
1{ 2 "extends": "@emerson-eps/eslint-config", 3 "rules": { 4 // Additional rules... 5 } 6}
List of current rules
The list of applied rules can be found here
Running ESLint on your code
Add a lint script to your package.json
, for example:
1{ 2 "scripts": { 3 "lint": "eslint . --max-warnings=0" 4 } 5}
Code can then be linted with:
1npm run lint
CI pipelines should be configured to fail on linting warnings.
Integration with Visual Studio Code
If not already installed, install the Prettier and ESLint extensions.
Overriding the shared configs
Try not to override the shared configs unless you really need to. If you must override them please consider proposing the override as a change to the relevant repository first to avoid divergence of code styles in different projects.
No vulnerabilities found.
Reason
no binaries found in the repo
Reason
15 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Reason
all changesets reviewed
Reason
no dangerous workflow patterns detected
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
SAST tool is run on all commits
Details
- Info: SAST configuration detected: CodeQL
- Info: all commits (30) are checked with a SAST tool
Reason
1 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275
Reason
dependency not pinned by hash detected -- score normalized to 1
Details
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:41: update your workflow using https://app.stepsecurity.io/secureworkflow/emerson-eps/eslint-config/codeql-analysis.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:45: update your workflow using https://app.stepsecurity.io/secureworkflow/emerson-eps/eslint-config/codeql-analysis.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:58: update your workflow using https://app.stepsecurity.io/secureworkflow/emerson-eps/eslint-config/codeql-analysis.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:71: update your workflow using https://app.stepsecurity.io/secureworkflow/emerson-eps/eslint-config/codeql-analysis.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/node.js.yml:20: update your workflow using https://app.stepsecurity.io/secureworkflow/emerson-eps/eslint-config/node.js.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/node.js.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/emerson-eps/eslint-config/node.js.yml/main?enable=pin
- Info: 0 out of 6 GitHub-owned GitHubAction dependencies pinned
- Info: 1 out of 1 npmCommand dependencies pinned
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Info: jobLevel 'contents' permission set to 'read': .github/workflows/codeql-analysis.yml:29
- Info: jobLevel 'actions' permission set to 'read': .github/workflows/codeql-analysis.yml:28
- Warn: no topLevel permission defined: .github/workflows/codeql-analysis.yml:1
- Warn: no topLevel permission defined: .github/workflows/node.js.yml:1
- Info: no jobLevel write permissions found
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
- Warn: no security policy file detected
- Warn: no security file to analyze
- Warn: no security file to analyze
- Warn: no security file to analyze
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Score
6.5
/10
Last Scanned on 2024-12-23
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More