
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
observable-mongo
Advanced tools
Functions that provide some 'node mongodb driver APIs' as Observables.
To run the tests it is required to have a working instance of Mongo to connect to. The default is to have a local mongo installed at port 27017 as specified in the default "config.ts" file in the "src" folder.
In case you want to run the tests on other mongo instances, change "config.ts" and run the command "npm run tsc" to rigenerate the "dist" directory with the configuration information
For use cases that see different asyncrhonous elements interacting, using the Observable pattern can simplify and clarify the code.
A simple use case can be the following:
In this case you need to interact with Mongo, http requests and the Node fs library, which all offer asynchrnous APIs. If these APIs offer also an Observable version, that the code of the example can be written as a single stream, leading to a more readable code (personal opinion).
The example in the repo represents this use case using observable-http-request and observable-fs, which are companion libraries of observable-mongo.
FAQs
Functions that provide 'node mongodb driver APIs' as Observables
We found that observable-mongo demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.