
Product
Reachability for Ruby Now in Beta
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.
auto-rest-api
Advanced tools
A light-weight CLI tool for deploying dynamically generated REST APIs against relational databases. See the project documentation for detailed usage instructions.
Auto-REST provides built-in support for the database types listed below. Support for additional databases can be added by installing the corresponding database drivers. See the official documentation for instructions.
| Flag | Default Driver | Database Type |
|---|---|---|
--sqlite | sqlite+aiosqlite | SQLite |
--psql | postgresql+asyncpg | PostgreSQL |
--mysql | mysql+asyncmy | MySQL |
--oracle | oracle+oracledb | Oracle |
--mssql | mssql+aiomysql | Microsoft SQL Server |
--driver | Custom driver (user-defined) | Custom |
Install the command line utility using your favorite Python package manager.
pipx install auto-rest-api
Check the package installed correctly.
auto-rest --help
Launch an API by providing connection arguments to a database of your choice.
auto-rest \
--psql
--db-host localhost
--db-port 5432
--db-name default
--db-user jsmith
--db-password secure123!
Navigate localhost:8081/docs/ to view the OpenAPI documentation for your dynamically generated REST API!
FAQs
Automatically map database schemas and deploy per-table REST API endpoints.
We found that auto-rest-api demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.