CasperSecurity

Current Path : /var/www/hrms.uiet.co.in/node_modules/std-env/
Upload File :
Current File : /var/www/hrms.uiet.co.in/node_modules/std-env/README.md

# std-env

[![npm](https://img.shields.io/npm/dm/std-env.svg?style=flat-square)](http://npmjs.com/package/std-env)
[![npm](https://img.shields.io/npm/v/std-env.svg?style=flat-square)](http://npmjs.com/package/std-env)
[![bundlephobia](https://img.shields.io/bundlephobia/min/std-env/latest.svg?style=flat-square)](https://bundlephobia.com/result?p=std-env)

> Detect current Javascript environment

## Installation

```sh
# Using Yarn
yarn add std-env

# Using npm
npm i std-env
```

## Usage

```js
// ESM
import { isWindows } from 'std-env'

// CommonJS
const { isCI } = require('std-env')
```

Available exports:

- `hasTTY`
- `hasWindow`
- `isCI`
- `isDebug`
- `isDevelopment`
- `isLinux`
- `isMacOS`
- `isMinimal`
- `isProduction`
- `isTest`
- `isWindows`
- `platform`
- `provider`

You can read more about how each flag works from [./src/index.ts](./src/index.ts).

List of well known providers can be found from [./src/providers.ts](./src/providers.ts).


## License

MIT
Hacker Blog, Shell İndir, Sql İnjection, XSS Attacks, LFI Attacks, Social Hacking, Exploit Bot, Proxy Tools, Web Shell, PHP Shell, Alfa Shell İndir, Hacking Training Set, DDoS Script, Denial Of Service, Botnet, RFI Attacks, Encryption
Telegram @BIBIL_0DAY