Multiple input with directories or files as input value for option -i or --input.
Multiple outputs for each input svg.
Support case in export name declaration (camel|snake|pascal|constant).
Suffix and Prefix for generated code of export name declaration.
Support type annotation when code generated is <Icon />.
Usage
Command Line Arguments
1create-chakra-icons [FLAGS] [OPTIONS] [INPUT]
Flags
1-h, --help Prints help information
2-V, --version Prints version information
Options
1-i, --input <PATH> This option for read the input from PATH of FILE or DIRECTORIES.
2 [e.g.: -i some/path , -i file.svg]
3-o, --output <PATH> Writes the output or sets output directory. [default: stdout]
4-n, --name <STRING> Sets value for `displayName` properties
5 (*ONLY for pipelines command). [default: Unamed] [e.g. -n "MyIcon"]
6-C, --case <snake|camel|constant|pascal>
7 Sets for case [snake|camel|constant|pascal] in export named declaration
8 output. [default: pascal]
9-S, --suffix <STRING> Sets for suffix in export named declaration.
10-P, --prefix <STRING> Sets for prefix in export named declaration.
11 [e.g.: -S "Icon"]
12--ts, --typescript Sets output as TypeScript code.
1314--m, --multi Creates separate output for each input (*ONLY for CLI command).
1516-T, --type <TYPE> TYPE:
17 (F|f). Sets output code with function \`createIcon({...})\`.
18 (C|c). Sets output code with Component Icon \`(props) => <Icon> {...} </Icon>\`.
1920 [e.g.: -T C]
21
Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
9 existing vulnerabilities detected
Details
Warn: Project is vulnerable to: GHSA-67hx-6x53-jw92
Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg
Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275
Warn: Project is vulnerable to: GHSA-952p-6rrq-rcjv
Warn: Project is vulnerable to: GHSA-mwcw-c2x4-8c55
Warn: Project is vulnerable to: GHSA-7fh5-64p2-3v2j
Warn: Project is vulnerable to: GHSA-gcx4-mw62-g8wm
Warn: Project is vulnerable to: GHSA-f5x3-32g6-xq36
Warn: Project is vulnerable to: GHSA-m95q-7qp3-xv42
Reason
Found 0/23 approved changesets -- score normalized to 0
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
detected GitHub workflow tokens with excessive permissions
Details
Warn: no topLevel permission defined: .github/workflows/pr.yml:1
Warn: no topLevel permission defined: .github/workflows/release.yml:1
Warn: no topLevel permission defined: .github/workflows/sync.yml:1
Info: no jobLevel write permissions found
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
Warn: no security policy file detected
Warn: no security file to analyze
Warn: no security file to analyze
Warn: no security file to analyze
Reason
project is not fuzzed
Details
Warn: no fuzzer integrations found
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pr.yml:12: update your workflow using https://app.stepsecurity.io/secureworkflow/kodingdotninja/chakra-icons/pr.yml/main?enable=pin
Warn: third-party GitHubAction not pinned by hash: .github/workflows/pr.yml:14: update your workflow using https://app.stepsecurity.io/secureworkflow/kodingdotninja/chakra-icons/pr.yml/main?enable=pin
Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pr.yml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/kodingdotninja/chakra-icons/pr.yml/main?enable=pin
Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pr.yml:30: update your workflow using https://app.stepsecurity.io/secureworkflow/kodingdotninja/chakra-icons/pr.yml/main?enable=pin
Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pr.yml:40: update your workflow using https://app.stepsecurity.io/secureworkflow/kodingdotninja/chakra-icons/pr.yml/main?enable=pin
Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:11: update your workflow using https://app.stepsecurity.io/secureworkflow/kodingdotninja/chakra-icons/release.yml/main?enable=pin
Warn: third-party GitHubAction not pinned by hash: .github/workflows/release.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/kodingdotninja/chakra-icons/release.yml/main?enable=pin
Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/kodingdotninja/chakra-icons/release.yml/main?enable=pin
Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:29: update your workflow using https://app.stepsecurity.io/secureworkflow/kodingdotninja/chakra-icons/release.yml/main?enable=pin
Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:48: update your workflow using https://app.stepsecurity.io/secureworkflow/kodingdotninja/chakra-icons/release.yml/main?enable=pin
Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/sync.yml:12: update your workflow using https://app.stepsecurity.io/secureworkflow/kodingdotninja/chakra-icons/sync.yml/main?enable=pin
Warn: third-party GitHubAction not pinned by hash: .github/workflows/sync.yml:20: update your workflow using https://app.stepsecurity.io/secureworkflow/kodingdotninja/chakra-icons/sync.yml/main?enable=pin
Info: 0 out of 9 GitHub-owned GitHubAction dependencies pinned
Info: 0 out of 3 third-party GitHubAction dependencies pinned
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
Warn: 0 commits out of 7 are checked with a SAST tool
Score
2.9
/10
Last Scanned on 2025-01-27
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.