Use WeChat to scan and experience the example of small program components. Before you start using iView Weapp, you need to read the micro-channel applet custom components related documents. We have built-in examples of all components, you can scan the small program code experience on the right, or view it in WeChat developer tools. Then, the examplesdirectory can be opened in the micro-channel developer tools. We adopted a 24-grid system to divide the area into 24 equal parts, which can easily deal with most layout problems. Using the grid system for web page layout can make the page layout beautiful and comfortable. The grid contains 4 components: i-grid, i-grid-item, i-grid-icon, i-grid-label, among them, i-grid-icon and i-grid-label have customized styles by default, but These two components can also be eliminated in development.

Features

  • Basic components, used when triggering business logic
  • Basic grid layout
  • Introduce components in .json
  • The basic container is used to display text, lists, graphics and other content
  • Quickly switch between different functional modules
  • Allows users to switch between different views

Project Samples

Project Activity

See All Activity >

License

MIT License

Follow iView Weapp

iView Weapp Web Site

Other Useful Business Software
Attack Surface Management | Criminal IP ASM Icon
Attack Surface Management | Criminal IP ASM

For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Learn More
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of iView Weapp!

Additional Project Details

Programming Language

JavaScript

Related Categories

JavaScript Chat Software, JavaScript User Interface (UI) Software, JavaScript Libraries

Registered

2021-09-13