
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
graphfront
Advanced tools
Generate a GraphQL schema for any PostgreSQL database using the database schema information
Use a PostgreSQL database schema information to generate a GraphQL schema.
This is a work-in-progress project. It requires a super recent version of Node.js and using it in production is not recommended.
An overview of GraphQL in general is available in the README for the Specification for GraphQL.
Install Graphfront from npm
npm install --save graphfront
Graphfront provides two important capabilities: generating a GraphQL schema, and exposing an HTTP handler to server requests for that schema.
First, generate a GraphQL schema based on a database schema.
import { generator } from 'graphfront';
const { getSchema } = generator(dbPool, apiKeyValidator);
This defines a function that can be invoked to generate a schema.
Or you can use request handler that automatically generates the schema
const graphfront = require('graphfront');
const graphfrontHTTP = graphfront({
dbPool,
apiKeyValidator: (apiKey) => apiKey === 'SuperSecretKey'
});
app.use('/my-api', graphfrontHTTP);
We actively welcome pull requests, learn how to contribute.
Changes are tracked as Github releases.
graphfront is MIT licensed.
FAQs
Generate a GraphQL schema for any PostgreSQL database using the database schema information
We found that graphfront demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.