Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
graphile-build
Advanced tools
graphile-build
is the core of Graphile Engine. It provides a framework to
build high-performance extensible GraphQL APIs by combining plugins and using
advanced query look-ahead features. Each plugin typically has its own small
purpose (such as implementing the Node interface, adding query: Query
to
mutation payloads, or watching an external source for schema changes) and by
combining these plugins together you get a large, powerful, and manageable
GraphQL schema. Plugins enable you to make broad changes to your GraphQL
schema with minimal code and without sacrificing performance.
An example of an application built on graphile-build
is
PostGraphile which with one
command connects to your PostgreSQL database and provides a full highly
performant standards-compliant GraphQL API. The separate graphile-build-pg
module contains the plugins that are specific to PostgreSQL support
(graphile-build
itself does not know about databases).
For in-depth documentation about graphile-build
, please see the graphile
documentation website at graphile.org. The
below just serves as a limited quick-reference for people already familiar
with the library.
Please note: rather than using the raw plugin interface that
graphile-build
exposes, you may want to use the helpers in
the graphile-utils
module.
FAQs
Build a GraphQL schema from plugins
The npm package graphile-build receives a total of 2,878 weekly downloads. As such, graphile-build popularity was classified as popular.
We found that graphile-build demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.