Gathering detailed insights and metrics for eslint-plugin-local-rules
Gathering detailed insights and metrics for eslint-plugin-local-rules
Gathering detailed insights and metrics for eslint-plugin-local-rules
Gathering detailed insights and metrics for eslint-plugin-local-rules
eslint-plugin-n8n-local-rules
Plugin for n8n local rules. Based on Clayton Watts's eslint-plugin-local-rules
eslint-plugin-local
This ESLint plugin allows you to implement a custom ESLint plugin including custom rules in your repository without installing them as a dependency.
eslint-plugin-rulesdir
Allows a local ESLint rules directory to be used without a command-line flag
@fltri/eslint-plugin-local-rules
Define local rules for eslint without having an extra package.
A plugin for ESLint that allows you to use project-specific rules
npm install eslint-plugin-local-rules
Typescript
Module System
Node Version
NPM Version
99.8
Supply Chain
100
Quality
77.7
Maintenance
100
Vulnerability
100
License
JavaScript (100%)
Total Downloads
35,925,993
Last Day
85,179
Last Week
485,120
Last Month
2,103,177
Last Year
18,374,789
MIT License
167 Stars
53 Commits
9 Forks
2 Watchers
3 Branches
10 Contributors
Updated on Mar 27, 2025
Minified
Minified + Gzipped
Latest Version
3.0.2
Package Id
eslint-plugin-local-rules@3.0.2
Unpacked Size
11.08 kB
Size
4.60 kB
File Count
14
NPM Version
10.7.0
Node Version
20.14.0
Published on
Jun 23, 2024
Cumulative downloads
Total Downloads
A plugin for ESLint that allows you to use project-specific rules, similar to the deprecated --rulesdir
command line option (more).
1npm install eslint-plugin-local-rules
1'use strict'; 2 3module.exports = { 4 'disallow-identifiers': { 5 meta: { 6 docs: { 7 description: 'disallow identifiers', 8 category: 'Possible Errors', 9 }, 10 schema: [], 11 }, 12 create: function (context) { 13 return { 14 Identifier: function (node) { 15 context.report({ 16 node: node, 17 message: 'Identifiers not allowed for Super Important reasons.', 18 }); 19 }, 20 }; 21 }, 22 }, 23};
1{ 2 "plugins": ["local-rules"], 3 "extends": [ 4 "plugin:local-rules/all" 5 ] 6}
1{ 2 "plugins": ["local-rules"], 3 "extends": [ 4 "plugin:local-rules/all-warn" 5 ] 6}
1{ 2 "plugins": ["local-rules"], 3 "rules": { 4 "local-rules/disallow-identifiers": "error" 5 } 6}
npm install ts-node @types/eslint
You'll also need an eslint config like the .eslintrc above (more info).
1require("ts-node").register({ 2 transpileOnly: true, 3 compilerOptions: { 4 module: "commonjs", 5 }, 6}); 7 8module.exports = require("./rules").default;
1import type { Rule } from "eslint"; 2 3export default { 4 "disallow-identifiers": { 5 meta: { 6 docs: { 7 description: 'disallow identifiers', 8 category: 'Possible Errors', 9 }, 10 schema: [], 11 }, 12 create: function (context) { 13 return { 14 Identifier: function (node) { 15 context.report({ 16 node: node, 17 message: 'Identifiers not allowed for Super Important reasons.', 18 }); 19 }, 20 }; 21 }, 22 }, 23} satisfies Record<string, Rule.RuleModule>;
This plugin supports npm/yarn/pnpm workspaces, although note that if the eslint-local-rules.js file is in the workspace subdirectory, running from the project root is unsupported.
For example, if there's an eslint-local-rules.js and index.js in ./src/app:
Wrong: npx eslint src/app/index.js
Right: (cd src/app; npx eslint index.js)
Also note that if there is an eslint-local-rules.js file in both the workspace subdirectory and project root, the workspace one takes precedence (assuming you're running eslint from the workspace directory, as above).
processors
MIT
No vulnerabilities found.
Reason
no dangerous workflow patterns detected
Reason
no binaries found in the repo
Reason
license file detected
Details
Reason
dependency not pinned by hash detected -- score normalized to 3
Details
Reason
Found 4/24 approved changesets -- score normalized to 1
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
Reason
project is not fuzzed
Details
Reason
branch protection not enabled on development/release branches
Details
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
Reason
12 existing vulnerabilities detected
Details
Score
Last Scanned on 2025-05-05
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn MoreLast Day
14.3%
85,179
Compared to previous day
Last Week
-3.4%
485,120
Compared to previous week
Last Month
0.1%
2,103,177
Compared to previous month
Last Year
118.9%
18,374,789
Compared to previous year