Damn-Vulnerable-GraphQL-Application
sandworm-audit
Our great sponsors
Damn-Vulnerable-GraphQL-Application | sandworm-audit | |
---|---|---|
4 | 6 | |
1,423 | 462 | |
- | -0.6% | |
5.6 | 8.4 | |
4 months ago | 6 months ago | |
JavaScript | JavaScript | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Damn-Vulnerable-GraphQL-Application
-
Security Testing Graphql
It's not exactly a tool, but Damn Vulnerable GraphQL Application is pretty useful: https://github.com/dolevf/Damn-Vulnerable-GraphQL-Application
- DVGA - Damn Vulnerable GraphQL Application
-
Damn Vulnerable GraphQL Application
Usually in these when I write about some library or app I try to highlight its strengths. Well this time I’m going to do the complete opposite and talk about weaknesses. Rest assured it won't be some scorching review, because we’re looking at Damn Vulnerable GraphQL Application where weaknesses are completely intentional and exploiting them is the whole point.
- Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
sandworm-audit
-
Anyone else’s project use so many deprecated packages
use https://github.com/sandworm-hq/sandworm-audit. if u run it for your app the deprecated libraries will show up in the list of issues found (contributor)
-
Running Eleventy Serverless On AWS Lambda@Edge
And as you add more dependencies, it’s time to also build security and compliance into your app early. Sandworm Audit is the open-source npm audit that doesn’t suck: it checks for multiple types of issues, like vulnerabilities or license compliance, it outputs SVG charts and CSVs, and you can also run it in your CI to enforce security rules. Check the docs and npx @sandworm/audit in your JavaScript app’s root to try it out 🪱.
- Beautiful Security & License Compliance Reports For Your App's Dependencies
-
Sinkchart - open source visualisation tool for your JS dependencies
This is why we've created Sinkchart - beautiful Visualizations For Your App's Dependencies
-
Beautiful Visualizations For Your App's Dependencies
made with https://github.com/sandworm-hq/sinkchart
What are some alternatives?
pwndoc - Pentest Report Generator
sandworm-guard-js - Easy auditing & sandboxing for your JavaScript dependencies 🪱
reconmap - Vulnerability assessment and penetration testing automation and reporting platform for teams.
sandworm-jest - Security Snapshot Testing Inside Your Jest Test Suite 🪱
serverless-graphql - Serverless GraphQL Examples for AWS AppSync and Apollo
sandworm-mocha - Security Snapshot Testing Inside Your Mocha Test Suite 🪱
11ty-lambda-edge-demo - A simple tutorial for running Eleventy Serverless on AWS Lambda@Edge
Gatsby - The best React-based framework with performance, scalability and security built in.
Liquid - Liquid markup language. Safe, customer facing template language for flexible web apps.
eleventy 🕚⚡️ - A simpler site generator. Transforms a directory of templates (of varying types) into HTML.
Next.js - The React Framework