Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Promise based NodeJS API wrapper for Kitsu.io
yarn add kitsu
or
npm install kitsu --save
// ES6+
import Kitsu from 'kitsu'
// CommonJS
const Kitsu = require('kitsu').default
const kitsu = new Kitsu()
kitsu.get('anime').then(res => console.log(res))
Returns a Promise of a response
object
Type: string
The resource model to request. Check out the Kitsu API documentation for available models
Type: object
Any of the JSON API request parameters
Type: string
Include relationships. Multiple includes are comma seperated
Type: object
Returns only the specified fields
Type: string
Sort lists by an attribute. Append -
for descending order. Multiple sorts are comma seperated
Type: object
Limit number of returned resources (page: { limit: 2 }
).
Offset returned resources (page: { offset: 20 }
)
Type: object
Filter returned resources by an attribute
Fork this repo
Clone your fork:
git clone https://github.com/your-username/kitsu.git
cd kitsu
Create a feature branch:
git checkout -b your-feature-name
Install dependencies:
yarn install
# or
npm install
Commit changes:
git commit -am 'feat: add feature name'
Push changes:
git push origin your-feature-name
Open a pull request
See CHANGELOG
All code released under MIT
FAQs
A simple, lightweight & framework agnostic JSON:API client using Axios
We found that kitsu demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.