
Product
Reachability for Ruby Now in Beta
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.
A Jekyll generator plugin to lets you use SQLite database instead of data files as a data source. It lets you easily create APIs and websites from a SQLite database, by linking together a database file, your template, and the relevant queries.
It supports site-level queries, per-page queries, and prepared queries that can use existing data (possibly generated via more queries) as parameters.
The primary usecase is to avoid Liquid Hell, wherein you're left mangling multiple data sources from CSV/JSON/YAML files using liquid templating by saving temporary variables, creating maps, and so on. SQL is a decent language for reshaping datasets - supporting joins, filters, and aggregations. So this allows you to use SQL for reshaping your data, and then use liquid for what it was meant for - presentation and templating.
Documentation is now maintained at https://captnemo.in/jekyll-sqlite/.
Bug reports and pull requests are welcome on GitHub at https://github.com/captn3m0/jekyll-sqlite. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the code of conduct.
Note that only maintained versions of Jekyll and Ruby are supported.
Everyone interacting in the Jekyll::Sqlite project's codebases, issue trackers, chat rooms and mailing lists is expected to follow the code of conduct.
FAQs
Unknown package
We found that jekyll-sqlite demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.