Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@bit-js/blitz
Advanced tools
The fastest JavaScript router.
import Blitz from '@bit-js/blitz';
// Create the router
const router = new Blitz();
// Register paths
router.put('GET', '/', () => new Response('Hi'));
// Wildcard parameter (does not start with a slash)
router.put('GET', '/search/*', ctx => new Response(ctx.params.$));
// Path parameters
router.put('PUT', '/update/:id', ctx => new Response(ctx.params.id));
// Register another router with the same type as a subrouter
router.route('/api', anotherRouter);
// Get the fetch function (use with Bun and Deno)
const fetch = router.build();
The request context contains:
path
: The request pathname (Does not start with a slash).pathStart
: The request pathname start index in the request URL.pathEnd
: The request pathname end index in the request URL.params
: Request URL parameters.headers
: Response headers.status
: Response status.statusText
: Response status text.req
: The raw request object.Other utility routers.
The basic Blitz
router only works on non-edge runtimes as those block the use of the Function
constructor for code generation.
EdgeRouter
works everywhere as it matches routes using a recursive approach.
import { EdgeRouter } from '@bit-js/blitz';
// Create the router
const router = new EdgeRouter();
API usage is the same as Blitz
.
EdgeRouter
should be used in edge runtimes as Blitz
is around 2x faster in any other scenarios.
It is possible to re-use the matcher of EdgeRouter
after adding more routes, unlike Blitz
.
// Add some routes
router.put('GET', '/', () => new Response('Hi'));
// Match '/'
const fetch = router.build();
// Add another route
router.put('GET', '/user/:id', (ctx) => new Response(ctx.params.id));
// Fetch now handles both '/' and '/user/:id'
fetch(req);
A cross-runtime file system router API.
Example usage with Bun:
import { FileSystemRouter } from '@bit-js/blitz';
// A directory scanner
const glob = new Bun.Glob('**/*');
// Router prototype
const router = new FileSystemRouter({
// on(path): Return the metadata associated to the path to match later
// This only run once while scanning to retrieve the metadata
on: Bun.file,
// Scan synchronously and return the paths as an iterator
scan: (dir) => glob.scanSync(dir),
// style(path): Convert relative file path to route pathname (optional)
// Default to NextJS route path style
style: 'basic',
});
// Get the matcher
const match = router.scan(`${import.meta.dir}/internals`);
// Serve with Bun
export default {
fetch(req: Request) {
// Result is the metadata returned by on(path)
// In this case it is the file blob
return new Response(match(req).result);
}
}
basic
: NextJS route style (wildcard only supports [...]
and wildcard parameter name is always $
).preserve
: No modifications to the path.The result is a request context with result
property is the matched result.
FAQs
The fastest JavaScript URL router
The npm package @bit-js/blitz receives a total of 3 weekly downloads. As such, @bit-js/blitz popularity was classified as not popular.
We found that @bit-js/blitz demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.