Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
🎩 No-code platform for creating scalable backends for communities and user based apps
With Commun you can build powerful backends for communities and user based apps without coding. Commun helps you build scalable APIs in hours instead of months by giving you powerful tools to model your app in a graphic UI.
You need to install Node.js and MongoDB first, then just run:
npx create-commun-app my-app
cd my-app
npm start
Commun can be used to create any kind of application, but it can be extra helpful for creating applications in which the users can create content or any kind of contributions.
Some examples include:
Commun comes with a complete dashboard that you can use to manage your application without having to write any code.
The dashboard also works perfectly on mobile devices, so you can manage your app on the go.
All the configuration used by Commun is stored in json files, which are updated by the dashboard.
The best practice is to run Commun in development, make all the required changes and then commit these changes to your repository. In order to deploy, just pull the changes in your production server and restart the node process.
The benefits of this practice are:
FAQs
🎩 Fully-featured framework for REST APIs and GraphQL from JSON Schema with TypeScript and MongoDB
We found that commun demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.