
Security News
Risky Biz Podcast: Making Reachability Analysis Work in Real-World Codebases
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
@nearst/gatsby-source-dynamodb
Advanced tools
Forked from https://github.com/wmlutz/gatsby-source-dynamodb
This module helps you pull your AWS dynamodb account using IAM credentials. The inspiration was designed to assist connecting private tables from AWS Amplify for public-facing sites.
To install:
yarn add gatsby-source-dynamodb
(or npm install --save gatsby-source-dynamodb
)
Then add the config to your gatsby-config.js
:
module.exports = {
plugins: [
{
resolve: 'gatsby-source-dynamodb',
options: {
typeName: '<INPUT_GRAPHQL_TYPE_NAME_HERE>',
accessKeyId: '<AWS_ACCESS_KEY_ID>',
secretAccessKey: '<AWS_SECRET_ACCESS_KEY>',
region: '<AWS_REGION>',
params: {
TableName : "<TABLE_NAME>",
// OTHER PARAMS HERE
}
}
},
],
};
Get your AWS Credentials for IAM user: https://docs.aws.amazon.com/sdk-for-javascript/v2/developer-guide/getting-your-credentials.html
Set up permissions for your IAM user, you only need scan: https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/using-identity-based-policies.html
Use params from AWS DynamoDB Query Scan: https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/GettingStarted.Js.04.html#GettingStarted.Js.04.Scan
It is strongly recommended that credentials are stored in environment variables.
FAQs
Source info from DynamoDB
The npm package @nearst/gatsby-source-dynamodb receives a total of 1 weekly downloads. As such, @nearst/gatsby-source-dynamodb popularity was classified as not popular.
We found that @nearst/gatsby-source-dynamodb demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 9 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.