
Product
Reachability for Ruby Now in Beta
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.
react-elasticsearch
Advanced tools
[](https://npmjs.org/package/react-elasticsearch) [](https://npmjs.org/package/react-elasticsearch) [ => (
<Elasticsearch url="http://example.org/search">
<SearchBox id="mainSearch" />
<Facet id="actors" fields={["actors"]} />
<Facet id="releasedYear" fields={["releasedYear"]} />
<Results
id="results"
items={data =>
// Map on result hits and display whatever you want.
data.map(item => <MyCardItem key={item._id} source={item._source} />)
}
/>
</Elasticsearch>
);
npm i react-elasticsearch
yarn add react-elasticsearch
You can test components with storybook (20+ examples).
npm run storybook
We started building the search experience of the french Cultural Heritage Open Platform with ReactiveSearch, a well-known search UI components lib for React. After some weeks, we realized we had spent a lot of time tweaking and hacking the lib; we had rewrote almost every components ourselves. We opened issues and pull requests on the repository, but it seemed the lib was a bit stuck in a rewrite process. We found out that we need a simple lib that can be easily extended with a similar API, we created this one. This lib has many less feature than others, it's not even a decent competitor. But since it helped us building a search experiences, it has been released. Hope it could help you!
Open issues and PR here: https://github.com/betagouv/react-elasticsearch
FAQs
[](https://npmjs.org/package/react-elasticsearch) [](https://npmjs.org/package/react-elasticsearch) [
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.