Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
azure-table
Advanced tools
Azure table library for node & browsers
(azure_table can be used with component or requirejs but I am going to show the common js version).
var adapter = require('azure-table/adapter/fetch_signature')(
// XXX: See test/server for example of what the server should domains
'/azure/sign'
);
// requests see test/server.js for an example server implementation.
var table = require('azure-table/request')(
'myTable',
adapter
)
// this is a superagent request
var request = table.queryEntities();
request.query('$top', 10);
request.end().then(function(res) {
// res.body
});
CORS must be enabled for your account... From node there is no easy way to do this currently so I hacked together azure-cors which is terrible (but only needs to be run once) way to enable CORS for all methods and domains, etc...
FAQs
Simplified azure table service client for node and the browser.
We found that azure-table demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.