Security Advisories (1)
CVE-2025-30672 (2025-04-01)

Mite for Perl before 0.013000 generates code with the current working directory ('.') added to the @INC path similar to CVE-2016-1238. If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution. This affects the Mite distribution itself, and other distributions that contain code generated by Mite.

Changes for version 0.007000 - 2022-07-17

  • Documentation
    • Explicitly document that Mite's objects are blessed hashrefs.
  • Other
    • Added: New `signature_for` keyword, adding Type::Params-like signatures.
    • Added: clone_on_read and clone_on_write options for attributes.

Documentation

A Perl OO compiler
options for defining attributes with Mite
comparing Mite with Moose, Moo, and Mouse
other features provided by Mite
functions exported by Mite
major Moose features not supported by Mite
how to work with Mite

Modules

Moose-like OO, fast to load, with zero dependencies.
guts for bin/mite
base class for subcommands for bin/mite
provides the "clean" command
provides the "compile" command
provides the "init" command
provides the "preview" command
an attribute in a class or role
a class within a project
the extra compiled module file written by Mite
configuration file for a project
use in your Makefile.PL when developing with Mite
Mite within a Mite
use in your Build.PL when developing with Mite
a whole project
a role within a project
a role within a project, but using Role::Tiny
shim to load .mite.pm files
a signature for a method in a class or role
a human-written perl module within a project

Provides

in lib/Mite/Signature/Compiler.pm
in lib/Mite/Types.pm