Installations
npm install angular-imask
Developer Guide
Typescript
No
Module System
ESM
Node Version
21.7.3
NPM Version
lerna/8.1.2/node@v21.7.3+arm64 (darwin)
Score
99
Supply Chain
88.2
Quality
79.8
Maintenance
100
Vulnerability
100
License
Releases
Contributors
Unable to fetch Contributors
Languages
TypeScript (93.31%)
JavaScript (3.67%)
HTML (2.96%)
Ruby (0.05%)
Developer
Download Statistics
Total Downloads
9,838,845
Last Day
11,847
Last Week
49,499
Last Month
224,536
Last Year
2,589,330
GitHub Statistics
5,011 Stars
956 Commits
262 Forks
30 Watching
9 Branches
29 Contributors
Bundle Size
63.79 kB
Minified
17.13 kB
Minified + Gzipped
Package Meta Information
Latest Version
7.6.1
Package Id
angular-imask@7.6.1
Unpacked Size
62.93 kB
Size
16.21 kB
File Count
20
NPM Version
lerna/8.1.2/node@v21.7.3+arm64 (darwin)
Node Version
21.7.3
Publised On
21 May 2024
Total Downloads
Cumulative downloads
Total Downloads
9,838,845
Last day
8.7%
11,847
Compared to previous day
Last week
-10.8%
49,499
Compared to previous week
Last month
5%
224,536
Compared to previous month
Last year
3.2%
2,589,330
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Angular IMask Plugin
angular-imask
Install
npm install angular-imask
Setup
1import { IMaskModule } from 'angular-imask'; 2 3@NgModule({ 4 imports: [ 5 IMaskModule, 6 ... 7 ], 8 ... 9}) {...}
Usage
1<!-- directive --> 2<input 3 [imask]="{mask: '+{7}(000)000-00-00'}" <!--see more mask props in a guide--> 4 [unmask]="true" <!--true|false|'typed'--> 5 (accept)="onAccept" <!--depending on prop above first argument is 6 `value` if `unmask=false`, 7 `unmaskedValue` if `unmask=true`, 8 `typedValue` if `unmask='typed'`--> 9 (complete)="onComplete" 10 <!-- OPTIONAL: provide custom element getter --> 11 [imaskElement]="(elementRef, directiveRef) => maskElement" <!-- default = elementRef.nativeElement --> 12/> 13 14<!-- pipe --> 15<p>{{ value | imask:mask }}</p>
More options see in a guide.
Development
As to make changes to this package follow the steps:
- Build imask
npm run make
- Go to angular-imask directory
cd packages/angular-imask
- Launch dev command
npm run dev
- (Optional) Launch example app
npm run example
No vulnerabilities found.
Reason
GitHub workflow tokens follow principle of least privilege
Details
- Info: topLevel 'contents' permission set to 'read': .github/workflows/deploy.yml:13
- Info: no jobLevel write permissions found
Reason
no dangerous workflow patterns detected
Reason
no binaries found in the repo
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
dependency not pinned by hash detected -- score normalized to 3
Details
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/deploy.yml:29: update your workflow using https://app.stepsecurity.io/secureworkflow/uNmAnNeR/imaskjs/deploy.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/deploy.yml:31: update your workflow using https://app.stepsecurity.io/secureworkflow/uNmAnNeR/imaskjs/deploy.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/deploy.yml:40: update your workflow using https://app.stepsecurity.io/secureworkflow/uNmAnNeR/imaskjs/deploy.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/deploy.yml:44: update your workflow using https://app.stepsecurity.io/secureworkflow/uNmAnNeR/imaskjs/deploy.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/deploy.yml:46: update your workflow using https://app.stepsecurity.io/secureworkflow/uNmAnNeR/imaskjs/deploy.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/deploy.yml:51: update your workflow using https://app.stepsecurity.io/secureworkflow/uNmAnNeR/imaskjs/deploy.yml/master?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/deploy.yml:65: update your workflow using https://app.stepsecurity.io/secureworkflow/uNmAnNeR/imaskjs/deploy.yml/master?enable=pin
- Info: 0 out of 6 GitHub-owned GitHubAction dependencies pinned
- Info: 0 out of 1 third-party GitHubAction dependencies pinned
- Info: 1 out of 1 npmCommand dependencies pinned
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
Found 2/27 approved changesets -- score normalized to 0
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
- Warn: no security policy file detected
- Warn: no security file to analyze
- Warn: no security file to analyze
- Warn: no security file to analyze
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
branch protection not enabled on development/release branches
Details
- Warn: branch protection not enabled for branch 'master'
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
- Warn: 0 commits out of 5 are checked with a SAST tool
Reason
31 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-pxvg-2qj5-37jq
- Warn: Project is vulnerable to: GHSA-r95h-9x8f-r3f7
- Warn: Project is vulnerable to: GHSA-vcc3-rw6f-jv97
- Warn: Project is vulnerable to: GHSA-xc9x-jj77-9p9j
- Warn: Project is vulnerable to: GHSA-2rxp-v6pw-ch6m
- Warn: Project is vulnerable to: GHSA-4xqq-m2hx-25v8
- Warn: Project is vulnerable to: GHSA-5866-49gr-22v4
- Warn: Project is vulnerable to: GHSA-r55c-59qm-vjw6
- Warn: Project is vulnerable to: GHSA-vg3r-rm7w-2xgh
- Warn: Project is vulnerable to: GHSA-vmwr-mc7x-5vc3
- Warn: Project is vulnerable to: GHSA-8hc4-vh64-cxmj
- Warn: Project is vulnerable to: GHSA-qwcr-r2fm-qrc7
- Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg
- Warn: Project is vulnerable to: GHSA-pxg6-pf52-xh8x
- Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275
- Warn: Project is vulnerable to: GHSA-qw6h-vgh9-j6wx
- Warn: Project is vulnerable to: GHSA-mpg4-rc92-vx8v
- Warn: Project is vulnerable to: GHSA-c7qv-q95q-8v27
- Warn: Project is vulnerable to: GHSA-952p-6rrq-rcjv
- Warn: Project is vulnerable to: GHSA-mwcw-c2x4-8c55
- Warn: Project is vulnerable to: GHSA-9wv6-86v2-598j
- Warn: Project is vulnerable to: GHSA-rhx6-c78j-4q9w
- Warn: Project is vulnerable to: GHSA-gcx4-mw62-g8wm
- Warn: Project is vulnerable to: GHSA-m6fv-jmcg-4jfg
- Warn: Project is vulnerable to: GHSA-cm22-4g7w-348p
- Warn: Project is vulnerable to: GHSA-8266-84wp-wv5c
- Warn: Project is vulnerable to: GHSA-4vvj-4cpr-p986 / GHSA-64vr-g452-qvp3
- Warn: Project is vulnerable to: GHSA-9cwx-2883-4wfx
- Warn: Project is vulnerable to: GHSA-vg6x-rcgg-rjx6
- Warn: Project is vulnerable to: GHSA-5j4c-8p2g-v4jx
- Warn: Project is vulnerable to: GHSA-3h5v-q93c-6h6q
Score
3.6
/10
Last Scanned on 2025-01-27
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More