<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Npm on MacWorks</title><link>https://macworks.dev/tags/npm/</link><description>Recent content in Npm on MacWorks</description><generator>Hugo</generator><language>en</language><atom:link href="https://macworks.dev/tags/npm/index.xml" rel="self" type="application/rss+xml"/><item><title>Engineer Reads</title><link>https://macworks.dev/docs/week/blogs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://macworks.dev/docs/week/blogs/</guid><description>&lt;h1 id="engineering-reads--week-of-2026-05-07-to-2026-05-15"&gt;Engineering Reads — Week of 2026-05-07 to 2026-05-15&lt;a class="anchor" href="#engineering-reads--week-of-2026-05-07-to-2026-05-15"&gt;#&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="week-in-review"&gt;Week in Review&lt;a class="anchor" href="#week-in-review"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;This week’s engineering discourse reflects a mature industry grappling with system boundaries and human intent. From constraining unpredictable AI integrations into strictly bounded functional workflows to leveraging organizational psychology to structure open-source compiler architecture, practitioners are aggressively reclaiming control over non-determinism. We are seeing a distinct pushback against buzzword-driven hype in favor of operational stability, rigorous domain modeling, and trusting native web standards over heavyweight abstractions.&lt;/p&gt;</description></item><item><title>2026-05-07</title><link>https://macworks.dev/docs/archives/blogs/engineer-blogs-2026-05-07/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://macworks.dev/docs/archives/blogs/engineer-blogs-2026-05-07/</guid><description>&lt;h1 id="engineering-reads--2026-05-07"&gt;Engineering Reads — 2026-05-07&lt;a class="anchor" href="#engineering-reads--2026-05-07"&gt;#&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="the-big-idea"&gt;The Big Idea&lt;a class="anchor" href="#the-big-idea"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;When the software ecosystem is reeling from a cascade of high-profile vulnerabilities, the most prudent engineering decision is often a temporary hard freeze on new dependencies to mitigate the risk of opportunistic supply-chain attacks.&lt;/p&gt;
&lt;h2 id="deep-reads"&gt;Deep Reads&lt;a class="anchor" href="#deep-reads"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Maybe you shouldn’t install new software for a bit&lt;/strong&gt; · Xe Iaso · &lt;a href="https://xeiaso.net/blog/2026/abstain-from-install/"&gt;xeiaso.net&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In the immediate aftermath of major vulnerability disclosures like &amp;ldquo;copy.fail&amp;rdquo;, &amp;ldquo;Copy Fail 2: Electric Boogaloo&amp;rdquo;, and &amp;ldquo;Dirty Frag&amp;rdquo;, the security ecosystem is highly destabilized. The core argument here is that this kind of chaos creates the perfect window for catastrophic supply-chain attacks to land with maximum impact, particularly through package managers like NPM. To defend against this, the author advocates for a strict, week-long moratorium on installing any new software or dependencies. The only stated exception to this system freeze is applying upstream Linux kernel patches provided by your distribution. Infrastructure engineers and tech leads should read this to recalibrate their risk posture and consider trading sprint velocity for system stability during periods of heavy vulnerability churn.&lt;/p&gt;</description></item></channel></rss>