Security News
CISA Brings KEV Data to GitHub
CISA's KEV data is now on GitHub, offering easier access, API integration, commit history tracking, and automated updates for security teams and researchers.
@teable/openapi
Advanced tools
"use strict"; Object.defineProperty(exports, "__esModule", { value: true }); exports.TQL_README = void 0; exports.TQL_README = `
Teable Query Language is a specialized language used for data querying in the Teable project. It allows you to filter and retrieve data based on specific conditions and logic.
Teable Query Language is a simple yet powerful language that enables you to create complex query conditions to meet your data querying needs. With Teable Query Language, you can easily specify fields, operators, and values to define query criteria.
Teable Query Language supports the following syntax and usage:
You can use `{field}` to represent the field you want to query. For example, `{name}` represents a field named "name".
Teable Query Language supports the following operators:
Here are some examples of Teable Query Language:
FAQs
Unknown package
The npm package @teable/openapi receives a total of 8 weekly downloads. As such, @teable/openapi popularity was classified as not popular.
We found that @teable/openapi demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
CISA's KEV data is now on GitHub, offering easier access, API integration, commit history tracking, and automated updates for security teams and researchers.
Security News
Opengrep forks Semgrep to preserve open source SAST in response to controversial licensing changes.
Security News
Critics call the Node.js EOL CVE a misuse of the system, sparking debate over CVE standards and the growing noise in vulnerability databases.