
Security News
Security Community Slams MIT-linked Report Claiming AI Powers 80% of Ransomware
Experts push back on new claims about AI-driven ransomware, warning that hype and sponsored research are distorting how the threat is understood.
@zuplo/cli
Advanced tools
Zuplo Zuplo's API Gateway helps small and large teams get APIs to production that ar
Zuplo's API Gateway helps small and large teams get APIs to production that are fast, secure and with game-changing Developer Experience.
The command-line interface for Zuplo.
zuplo <command>
Commands:
  zuplo convert   Converts routes.json to routes.oas.json
  zuplo delete    Deletes the Zuplo API at the URL
  zuplo deploy    Deploys current Git branch of the current directory
  zuplo dev       Runs the Zuplo API locally
  zuplo list      Lists all deployed Zuplo APIs
  zuplo link      Links information from your Zuplo account to your local machine
  zuplo login     Authenticates the user
  zuplo test      Runs the tests under /tests against an endpoint
  zuplo openapi   OpenAPI commands (aliases: oas, open-api)
  zuplo project   Project management commands
  zuplo proxies   Proxy configuration commands
  zuplo source    Source code management commands
  zuplo tunnel    Tunnel commands
  zuplo variable  Variable commands
zuplo openapi
OpenAPI commands
Commands:
  zuplo openapi convert   Convert OpenAPI files between JSON and YAML formats
  zuplo openapi merge     Merge an OpenAPI file into your Zuplo project
  zuplo openapi overlay   Apply an OpenAPI Overlay to an OpenAPI document
Aliases: oas, open-api
zuplo project
Project management commands
Commands:
  zuplo project create  Creates a new project in your account
zuplo proxies
Proxy configuration commands
Commands:
  zuplo proxies create    Creates a new proxy configuration for a fleet
  zuplo proxies update    Updates an existing proxy configuration for a fleet
  zuplo proxies describe  Describes a proxy configuration for a fleet
  zuplo proxies delete    Deletes a proxy configuration for a fleet
zuplo source
Source code management commands
Commands:
  zuplo source upgrade          Updates your project structure to the latest conventions
  zuplo source migrate          Migration commands
    zuplo source migrate dev-portal  Migrates legacy dev portal configuration to new format
zuplo tunnel
Tunnel commands
Commands:
  zuplo tunnel create        Creates a new tunnel in your account
  zuplo tunnel delete        Deletes a tunnel in your account
  zuplo tunnel describe      Describes a tunnel in your account
  zuplo tunnel list          Lists the tunnels in your account
  zuplo tunnel rotate-token  Rotates the token for a tunnel in your account
  zuplo tunnel services      Tunnel services commands
zuplo tunnel services
Tunnel services commands
Commands:
  zuplo tunnel services describe  Describes the services for this tunnel
  zuplo tunnel services update    Updates the services for this tunnel
zuplo variable
Variable commands
Commands:
  zuplo variable create      Creates a new variable for a branch
  zuplo variable update      Updates an existing variable for a branch
zuplo test
follows the Node.js
spec reporter.FAQs
Zuplo Zuplo's API Gateway helps small and large teams get APIs to production that ar
The npm package @zuplo/cli receives a total of 3,830 weekly downloads. As such, @zuplo/cli popularity was classified as popular.
We found that @zuplo/cli demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Experts push back on new claims about AI-driven ransomware, warning that hype and sponsored research are distorting how the threat is understood.

Security News
Ruby's creator Matz assumes control of RubyGems and Bundler repositories while former maintainers agree to step back and transfer all rights to end the dispute.

Research
/Security News
Socket researchers found 10 typosquatted npm packages that auto-run on install, show fake CAPTCHAs, fingerprint by IP, and deploy a credential stealer.