
Security News
Node.js Moves to Annual Major Releases Starting with Node 27
The project is retiring its odd/even release model in favor of a simpler annual cadence where every major version becomes LTS.
fast-xml-builder
Advanced tools
Build XML from JSON
XML Builder was the part of fast-xml-parser for years. But considering that any bug in parser may false-alarm the users who are only using builder, we have decided to split it into a separate package.
npm install fast-xml-builder
import XMLBuilder from 'fast-xml-builder';
const builder = new XMLBuilder();
const xml = builder.build({ name: 'value' });
fast-xml-builder fully support the response generated by fast-xml-parser. So you can use the maximum options as you are using for fast-xml-parser like preserveOrder, ignoreAttributes, attributeNamePrefix, textNodeName, cdataTagName, cdataPositionChar, format, indentBy, suppressEmptyNode and many more. Any change in parser will reflect here time to time.
FAQs
Build XML from JSON without C/C++ based libraries
The npm package fast-xml-builder receives a total of 10,013,173 weekly downloads. As such, fast-xml-builder popularity was classified as popular.
We found that fast-xml-builder demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The project is retiring its odd/even release model in favor of a simpler annual cadence where every major version becomes LTS.

Research
/Security News
Published late February to early March 2026, these crates impersonate timeapi.io and POST .env secrets to a threat actor-controlled lookalike domain.

Security News
A recent burst of security disclosures in the OpenClaw project is drawing attention to how vulnerability information flows across advisory and CVE systems.