
Research
PyPI Package Disguised as Instagram Growth Tool Harvests User Credentials
A deceptive PyPI package posing as an Instagram growth tool collects user credentials and sends them to third-party bot services.
@pothos-examples/graphql-shield
Advanced tools
This example shows how you can create a simple plugin to apply graphql shield rules to your schema
Supply Chain Security
Vulnerability
Quality
Maintenance
License
This example shows how you can create a simple plugin to apply graphql shield rules to your schema
This example uses the following packages:
@pothos/core
: For building the schemagraphql-yoga
: For creating a server that executes the schematype Comment {
author: User
comment: String!
id: ID!
post: Post!
}
type Post {
author: User
comments: [Comment!]!
content: String!
id: ID!
title: String!
}
type Query {
post(id: ID!): Post
posts(skip: Int, take: Int): [Post!]
user(id: ID!): User
}
type User {
comments: [Comment!]!
firstName: String!
fullName: String!
id: ID!
lastName: String!
posts: [Post!]!
}
FAQs
This example shows how you can create a simple plugin to apply graphql shield rules to your schema
The npm package @pothos-examples/graphql-shield receives a total of 82 weekly downloads. As such, @pothos-examples/graphql-shield popularity was classified as not popular.
We found that @pothos-examples/graphql-shield demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A deceptive PyPI package posing as an Instagram growth tool collects user credentials and sends them to third-party bot services.
Product
Socket now supports pylock.toml, enabling secure, reproducible Python builds with advanced scanning and full alignment with PEP 751's new standard.
Security News
Research
Socket uncovered two npm packages that register hidden HTTP endpoints to delete all files on command.