
Product
Introducing Pull Request Stories to Help Security Teams Track Supply Chain Risks
Socket’s new Pull Request Stories give security teams clear visibility into dependency risks and outcomes across scanned pull requests.
connect-guard
Advanced tools
Connect middleware that short circuits request handling if it can send a 304 Not Modified response. Intended to be used with reverse proxies like Varnish.
Guard is connect middleware that short circuits request handling if it can send a 304 Not Modified response. Intended to be used with reverse proxies like Varnish.
Work in-progress. Hold off for a bit.
Guard can store request and response information wherever you like. In memory is the default. If your site hosts lots of unique URLs, a DB is probably a better choice. Choose one of the following stores, or write your own.
$ git clone https://github.com/goodeggs/connect-guard && cd connect-guard
$ npm install
$ npm test
FAQs
Connect middleware that short circuits request handling if it can send a 304 Not Modified response. Intended to be used with reverse proxies like Varnish.
The npm package connect-guard receives a total of 0 weekly downloads. As such, connect-guard popularity was classified as not popular.
We found that connect-guard demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 6 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket’s new Pull Request Stories give security teams clear visibility into dependency risks and outcomes across scanned pull requests.
Research
/Security News
npm author Qix’s account was compromised, with malicious versions of popular packages like chalk-template, color-convert, and strip-ansi published.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.