
Company News
/Security News
Socket Selected for OpenAI's Cybersecurity Grant Program
Socket is an initial recipient of OpenAI's Cybersecurity Grant Program, which commits $10M in API credits to defenders securing open source software.
koa-request
Advanced tools
Very simple wrapper to the request library for use in koa.
Wraps the request lib as thunk-returning functions for use in kao's middleware generator-functions.
To install simply run:
npm install koa-request
Require koa first and will only work on node v0.11.7 or newer.
You must run node with --harmony flag (--harmony-generators works as well)
node --harmony example.js
Simple example using koa-request in koa:
var koa = require('koa');
var request = require('koa-request');
var app = koa();
app.use(function *() {
var options = {
url: 'https://api.github.com/repos/dionoid/koa-request',
headers: { 'User-Agent': 'request' }
};
var response = yield request(options); //Yay, HTTP requests with no callbacks!
var info = JSON.parse(response.body);
this.body = 'my full name is ' + info.full_name;
});
app.listen(process.env.PORT || 8080);
FAQs
wrapper to request library ready to use in koa
The npm package koa-request receives a total of 2,446 weekly downloads. As such, koa-request popularity was classified as popular.
We found that koa-request demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Company News
/Security News
Socket is an initial recipient of OpenAI's Cybersecurity Grant Program, which commits $10M in API credits to defenders securing open source software.

Security News
Socket CEO Feross Aboukhadijeh joins 10 Minutes or Less, a podcast by Ali Rohde, to discuss the recent surge in open source supply chain attacks.

Research
/Security News
Campaign of 108 extensions harvests identities, steals sessions, and adds backdoors to browsers, all tied to the same C2 infrastructure.