
Security News
Axios Maintainer Confirms Social Engineering Attack Behind npm Compromise
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.
airports-api
Advanced tools
Simple API for getting basic airports info, like city and country. Mostly for learning and demo purposes.
Check out http://airports-api.marinin.xyz. API is provided without any guarantees of anything, but I suppose I'll keep it running while it doesn't get too messy. Please, do not abuse this instance.
At the moment there is no authentication or rate limiting, and I want to keep it that way.
There are two most common types of airport identifier: IATA code and ICAO code. IATA code is the three-letter one on the luggage, like DME or JFK. ICAO code consists of 4 characters, like UUDD or KFJK.
This project uses data from @mwgg/Airports which is licensed under MIT license.
{"error": "Airport Not Found"}{"error": "Airport Not Found"}/iata, /icao, and available countries.Dataset is available at @mwgg/Airports and licensed under MIT license.
This code is licensed under MIT license as well.
Tim Marinin, 2017.
FAQs
Simple API to get airports
We found that airports-api demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.