Loaders for big data visualization. Website:
Installations
npm install @loaders.gl/draco
Releases
Unable to fetch releases
Developer
Developer Guide
Module System
ESM, UMD
Min. Node Version
Typescript Support
Yes
Node Version
20.16.0
NPM Version
lerna/8.1.8/node@v20.16.0+arm64 (darwin)
Statistics
715 Stars
2,648 Commits
195 Forks
32 Watching
80 Branches
98 Contributors
Updated on 26 Nov 2024
Languages
TypeScript (62.5%)
C++ (19.55%)
Mathematica (10.44%)
JavaScript (6.9%)
C (0.24%)
HTML (0.19%)
CMake (0.06%)
MDX (0.06%)
Dockerfile (0.02%)
Shell (0.02%)
CSS (0.02%)
Makefile (0.01%)
Total Downloads
Cumulative downloads
Total Downloads
22,076,574
Last day
-12.8%
39,153
Compared to previous day
Last week
-5.1%
226,748
Compared to previous week
Last month
10.8%
978,132
Compared to previous month
Last year
41.8%
9,215,148
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Peer Dependencies
1
Dev Dependencies
1
loaders.gl
loaders.gl is a framework in the vis.gl framework suite that provides a collection of framework-independent loaders focused on geospatial, 3D and big data visualization use cases.
Documentation
loaders.gl is extensively documented on the loaders.gl website.
Contributing
See CONTRIBUTING.md.
License
loaders.gl is licensed under a permissive open source license, using an MIT umbrella license.
Some individual loaders are forked from other open source code bases that are licensed be under different but compatible permissive licenses such as Apache 2 or BSD.
No code that uses proprietary, copy-left or non-permissive licenses is included in loaders.gl.
You can check the "Attributions" section for each loader module before you install it if the details matter to you.
No vulnerabilities found.
Reason
30 commit(s) and 10 issue activity found in the last 90 days -- score normalized to 10
Reason
security policy file detected
Details
- Info: security policy file detected: .github/SECURITY.md:1
- Info: Found linked content: .github/SECURITY.md:1
- Info: Found disclosure, vulnerability, and/or timelines in security policy: .github/SECURITY.md:1
- Info: Found text in security policy: .github/SECURITY.md:1
Reason
no dangerous workflow patterns detected
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Warn: project license file does not contain an FSF or OSI license.
Reason
binaries present in source code
Details
- Warn: binary detected: modules/draco/src/libs/draco_decoder.wasm:1
- Warn: binary detected: modules/textures/src/libs/basis_encoder.wasm:1
- Warn: binary detected: modules/textures/src/libs/basis_transcoder.wasm:1
Reason
Found 11/30 approved changesets -- score normalized to 3
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Warn: no topLevel permission defined: .github/workflows/test.yml:1
- Info: no jobLevel write permissions found
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
- Warn: 0 commits out of 28 are checked with a SAST tool
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/test.yml:17: update your workflow using https://app.stepsecurity.io/secureworkflow/visgl/loaders.gl/test.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/test.yml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/visgl/loaders.gl/test.yml/master?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/test.yml:45: update your workflow using https://app.stepsecurity.io/secureworkflow/visgl/loaders.gl/test.yml/master?enable=pin
- Warn: containerImage not pinned by hash: cpp/Model3DTiler/Dockerfile:1: pin your Docker image by updating ubuntu:15.10 to ubuntu:15.10@sha256:02521a2d079595241c6793b2044f02eecf294034f31d6e235ac4b2b54ffc41f3
- Warn: containerImage not pinned by hash: modules/tile-converter/Dockerfile:25: pin your Docker image by updating node:18-alpine to node:18-alpine@sha256:7e43a2d633d91e8655a6c0f45d2ed987aa4930f0792f6d9dd3bffc7496e44882
- Warn: npmCommand not pinned by hash: modules/tile-converter/Dockerfile:33
- Info: 0 out of 1 GitHub-owned GitHubAction dependencies pinned
- Info: 0 out of 2 third-party GitHubAction dependencies pinned
- Info: 0 out of 1 npmCommand dependencies pinned
- Info: 0 out of 2 containerImage dependencies pinned
Reason
20 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg
- Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275
- Warn: Project is vulnerable to: GHSA-pfrx-2q88-qq97
- Warn: Project is vulnerable to: GHSA-f8q6-p94x-37v3
- Warn: Project is vulnerable to: GHSA-qwcr-r2fm-qrc7
- Warn: Project is vulnerable to: GHSA-pxg6-pf52-xh8x
- Warn: Project is vulnerable to: GHSA-36jr-mh4h-2g58
- Warn: Project is vulnerable to: GHSA-fc9h-whq2-v747
- Warn: Project is vulnerable to: GHSA-qw6h-vgh9-j6wx
- Warn: Project is vulnerable to: GHSA-5v2h-r2cx-5xgj
- Warn: Project is vulnerable to: GHSA-rrrm-qjm4-v8hf
- Warn: Project is vulnerable to: GHSA-9wv6-86v2-598j
- Warn: Project is vulnerable to: GHSA-7fh5-64p2-3v2j
- Warn: Project is vulnerable to: GHSA-p8p7-x288-28g6
- Warn: Project is vulnerable to: GHSA-m6fv-jmcg-4jfg
- Warn: Project is vulnerable to: GHSA-cm22-4g7w-348p
- Warn: Project is vulnerable to: GHSA-72xf-g2v4-qvf3
- Warn: Project is vulnerable to: GHSA-w5p7-h5w8-2hfq
- Warn: Project is vulnerable to: GHSA-4r6h-8v6p-xvw6
- Warn: Project is vulnerable to: GHSA-5pgg-2g8v-p4x9
Score
4.4
/10
Last Scanned on 2024-11-18
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More