Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
extractgql
Advanced tools
This will be a simple build tool that enables query whitelisting for projects that use statically analyze-able GraphQL queries.
It scans a code directory and extracts GraphQL query documents from both .graphql
files as well as queries contained in
Javascript/Typescript files within a gql
tag. It then assigns these queries ID values/hashes and produces a JSON file which maps
from queries to hashes/IDs. This map can then be used by the client and server to perform query whitelisting, query lookups (i.e.
client only sends the hash/id, the server just looks up the corresponding query), etc.
The build tool will be called extractgql
. Running it with no other arguments should give:
Usage: extractgql input_file [output file]
It can be called on a Javascript/Typescript file or a file containing GraphQL query definitions with extension .graphql
:
extractgql index.js
extractgql index.ts
extractgql queries.graphql
It can also be called on a directory, which it will step through recursively:
extractgql src/
By default, the output will be palced in extracted_queries.json
. An output file can be specified as the second argument:
extractgql index.ts output.json
ExtractGQL
ExtractGQL
.graphql
files and
write an output JSON file from serialized query -> query.graphql
files with some degree of named fragment support and support for query transformers.FAQs
A build tool for GraphQL projects.
The npm package extractgql receives a total of 0 weekly downloads. As such, extractgql popularity was classified as not popular.
We found that extractgql demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.