Tagged articles
2 articles
Page 1 of 1
Huolala Tech
Huolala Tech
Sep 27, 2022 · Frontend Development

How to Build a Custom ESLint Rule to Rewrite Import Paths

This tutorial explains why and how to create a custom ESLint rule that automatically replaces specified import paths, using AST traversal, rule configuration, and fixers, with a complete example including project scaffolding, implementation details, and unit testing.

ASTESLintJavaScript
0 likes · 8 min read
How to Build a Custom ESLint Rule to Rewrite Import Paths
MaGe Linux Operations
MaGe Linux Operations
Apr 23, 2022 · Information Security

What Are the Most Common Python Vulnerabilities and How to Fix Them?

Python, a widely used high‑level language, suffers from several critical vulnerabilities—including command injection, outdated versions, insecure temporary files, misuse of assert statements, and import path issues—each explained with practical mitigation strategies to help developers secure their applications.

Code InjectionPythonassert statements
0 likes · 7 min read
What Are the Most Common Python Vulnerabilities and How to Fix Them?