
Product
Introducing Webhook Events for Pull Request Scans
Add real-time Socket webhook events to your workflows to automatically receive pull request scan results and security alerts in real time.
@nostr-dev-kit/ndk-cache-dexie
Advanced tools
NDK cache adapter for Dexie. Dexie is a wrapper around IndexedDB, an in-browser database.
NDK will attempt to use the Dexie adapter to store users, events, and tags. The default behaviour is to always check the cache first and then hit relays, replacing older cached events as needed.
pnpm add @nostr-dev-kit/ndk-cache-dexie
import NDKCacheAdapterDexie from "@nostr-dev-kit/ndk-cache-dexie";
const dexieAdapter = new NDKCacheAdapterDexie({ dbName: 'your-db-name' });
const ndk = new NDK({cacheAdapter: dexieAdapter, ...other config options});
🚨 Because Dexie only exists client-side, this cache adapter will not work in pure node.js environments. You'll need to make sure that you're using the right cache adapter in the right place (e.g. Redis on the backend, Dexie on the frontend).
MIT
FAQs
NDK Dexie Cache Adapter
The npm package @nostr-dev-kit/ndk-cache-dexie receives a total of 900 weekly downloads. As such, @nostr-dev-kit/ndk-cache-dexie popularity was classified as not popular.
We found that @nostr-dev-kit/ndk-cache-dexie demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Add real-time Socket webhook events to your workflows to automatically receive pull request scan results and security alerts in real time.
Research
The Socket Threat Research Team uncovered malicious NuGet packages typosquatting the popular Nethereum project to steal wallet keys.
Product
A single platform for static analysis, secrets detection, container scanning, and CVE checks—built on trusted open source tools, ready to run out of the box.