Gathering detailed insights and metrics for commitlint-config-aron
Gathering detailed insights and metrics for commitlint-config-aron
Gathering detailed insights and metrics for commitlint-config-aron
Gathering detailed insights and metrics for commitlint-config-aron
A monorepo ecosystem integrating first-class packages and conventional workflows ✨
npm install commitlint-config-aron
Typescript
Module System
Node Version
NPM Version
TypeScript (81%)
JavaScript (16.51%)
Svelte (1.5%)
CSS (0.67%)
Dockerfile (0.19%)
Shell (0.12%)
Total Downloads
0
Last Day
0
Last Week
0
Last Month
0
Last Year
0
MIT License
7 Stars
324 Commits
2 Watchers
2 Branches
3 Contributors
Updated on Nov 05, 2023
Latest Version
1.6.0
Package Id
commitlint-config-aron@1.6.0
Unpacked Size
8.85 kB
Size
2.75 kB
File Count
4
NPM Version
8.19.3
Node Version
18.12.1
Published on
Mar 27, 2023
Cumulative downloads
Total Downloads
Last Day
0%
NaN
Compared to previous day
Last Week
0%
NaN
Compared to previous week
Last Month
0%
NaN
Compared to previous month
Last Year
0%
NaN
Compared to previous year
Skip if you have already run npm install aronrepo
:
npm install commitlint-config-aron -D
Create a .commitlintrc.yml
file in your project root and extend aron
:
1extends: aron
Use Husky to register Git Hooks to automatically check whether it is legal before committing.
npx husky install
npx husky add .husky/commit-msg 'npx --no -- commitlint --edit ${1}'
Check if the .husky
is successfully generated in the project root:
1+ └── .husky 2+ ├─── _ 3+ └─── commit-msg
From now on, you just need to commit; the check happens after the commit. If everything is legal, there will be no prompts.
Pre-commit checks via Git Hook are only enabled when other team members clone the project and run npm install
.
Save commit-check
and husky install
commands for teamwork and CI:
1{ 2 "scripts": { 3 "install": "husky install", 4 "commit-check": "commitlint --from=HEAD~1 --verbose" 5 } 6}
npm run commit-check
:
Typically, you double-check commits before publishing and on relevant workflows, using GitHub Actions as an example:
Create a workflow for commit check /.github/workflows/commit-check.yml
:
1name: Commit Check 2on: 3 push: 4 branches: 5 - '**' 6 pull_request_target: 7 types: 8 - opened 9 - reopened 10 - edited 11 - synchronize 12 13jobs: 14 check: 15 timeout-minutes: 15 16 runs-on: ubuntu-20.04 17 strategy: 18 matrix: 19 node-version: [18.12.1] 20 steps: 21 - uses: actions/checkout@v3 22 with: 23 fetch-depth: 0 24 - uses: actions/setup-node@v3 25 with: 26 node-version: ${{ matrix.node-version }} 27 cache: 'npm' 28 - run: npm ci 29 - run: npm run commit-check 30
The header has a particular format that includes a Type
, a Target
, and a Summary
:
Type(Target): Summary
┊ ┊
┊ └─⫸ Target: Workspace, Package or Role
┊
└─⫸ Type: Bump, Feat, New, Perf, Add, Update, Improve, Fix, Depreciate, Drop, Docs, Upgrade, Revert, Example, Test, Refactor, Chore, Misc
For the full documentation, check out the Aron's conventional commits
No vulnerabilities found.
Reason
no dangerous workflow patterns detected
Reason
no binaries found in the repo
Reason
license file detected
Details
Reason
security policy file detected
Details
Reason
dependency not pinned by hash detected -- score normalized to 4
Details
Reason
project is archived
Details
Reason
Found 0/30 approved changesets -- score normalized to 0
Reason
no SAST tool detected
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
project is not fuzzed
Details
Reason
branch protection not enabled on development/release branches
Details
Reason
25 existing vulnerabilities detected
Details
Score
Last Scanned on 2025-07-14
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More