Installations
npm install @pulse-amplify/amplify-auth
Developer Guide
Typescript
No
Module System
CommonJS
Node Version
14.0.0
NPM Version
6.14.4
Score
48.7
Supply Chain
43.7
Quality
68.1
Maintenance
25
Vulnerability
92.9
License
Releases
2025-01-24 Amplify JS release - aws-amplify@6.12.2
Published on 24 Jan 2025
2025-01-14 Amplify JS release - aws-amplify@6.12.1
Published on 14 Jan 2025
2025-01-02 Amplify JS release - aws-amplify@6.12.0
Published on 03 Jan 2025
2024-12-19 Amplify JS release - aws-amplify@6.11.0
Published on 20 Dec 2024
2024-12-12 Amplify JS release - aws-amplify@6.10.3
Published on 13 Dec 2024
2024-12-10 Amplify JS release - aws-amplify@5.3.27
Published on 11 Dec 2024
Contributors
Languages
TypeScript (92.79%)
C (3.61%)
JavaScript (1.23%)
Kotlin (1.1%)
Swift (0.47%)
Objective-C (0.46%)
Java (0.12%)
Ruby (0.1%)
Shell (0.09%)
Objective-C++ (0.03%)
Developer
Download Statistics
Total Downloads
505
Last Day
1
Last Week
2
Last Month
8
Last Year
51
GitHub Statistics
9,473 Stars
9,839 Commits
2,143 Forks
211 Watching
98 Branches
471 Contributors
Bundle Size
312.90 kB
Minified
86.79 kB
Minified + Gzipped
Package Meta Information
Latest Version
2.1.7
Package Id
@pulse-amplify/amplify-auth@2.1.7
Unpacked Size
2.04 MB
Size
427.77 kB
File Count
93
NPM Version
6.14.4
Node Version
14.0.0
Total Downloads
Cumulative downloads
Total Downloads
505
Last day
0%
1
Compared to previous day
Last week
-33.3%
2
Compared to previous week
Last month
166.7%
8
Compared to previous month
Last year
-45.2%
51
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
ERROR: No README data found!
No vulnerabilities found.
Reason
30 commit(s) and 17 issue activity found in the last 90 days -- score normalized to 10
Reason
no dangerous workflow patterns detected
Reason
all changesets reviewed
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0
Reason
security policy file detected
Details
- Info: security policy file detected: github.com/aws-amplify/.github/SECURITY.md:1
- Info: Found linked content: github.com/aws-amplify/.github/SECURITY.md:1
- Info: Found disclosure, vulnerability, and/or timelines in security policy: github.com/aws-amplify/.github/SECURITY.md:1
- Info: Found text in security policy: github.com/aws-amplify/.github/SECURITY.md:1
Reason
SAST tool detected
Details
- Info: SAST configuration detected: CodeQL
- Info: SAST configuration detected: Snyk
- Warn: 29 commits out of 30 are checked with a SAST tool
Reason
0 existing vulnerabilities detected
Reason
binaries present in source code
Details
- Warn: binary detected: packages/react-native/android/gradle/wrapper/gradle-wrapper.jar:1
- Warn: binary detected: packages/react-native/example/android/gradle/wrapper/gradle-wrapper.jar:1
- Warn: binary detected: packages/rtn-push-notification/android/gradle/wrapper/gradle-wrapper.jar:1
- Warn: binary detected: packages/rtn-web-browser/android/gradle/wrapper/gradle-wrapper.jar:1
Reason
dependency not pinned by hash detected -- score normalized to 6
Details
- Warn: npmCommand not pinned by hash: .github/workflows/callable-canary-sampleapp-tests.yml:53
- Warn: npmCommand not pinned by hash: .github/workflows/callable-canary-sampleapp-tests.yml:126
- Warn: npmCommand not pinned by hash: .github/workflows/callable-canary-sampleapp-tests.yml:129
- Warn: npmCommand not pinned by hash: .github/workflows/callable-canary-sampleapp-tests.yml:187
- Warn: npmCommand not pinned by hash: .github/workflows/callable-canary-sampleapp-tests.yml:203
- Info: 34 out of 34 GitHub-owned GitHubAction dependencies pinned
- Info: 3 out of 3 third-party GitHubAction dependencies pinned
- Info: 0 out of 5 npmCommand dependencies pinned
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Info: jobLevel 'actions' permission set to 'read': .github/workflows/codeql.yml:18
- Info: jobLevel 'contents' permission set to 'read': .github/workflows/codeql.yml:19
- Warn: jobLevel 'contents' permission set to 'write': .github/workflows/push-latest-release.yml:18
- Warn: jobLevel 'contents' permission set to 'write': .github/workflows/push-lts-release.yml:21
- Info: jobLevel 'contents' permission set to 'read': .github/workflows/snyk-security.yml:16
- Info: jobLevel 'actions' permission set to 'read': .github/workflows/snyk-security.yml:18
- Warn: no topLevel permission defined: .github/workflows/aws-amplify-dependency-check.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-bundle-size-tests.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-canary-e2e-runner.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-canary-e2e-tests.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-canary-e2e.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-canary-sampleapp-tests.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-dependency-review.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-e2e-test-detox.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-e2e-test-headless.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-e2e-test.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-e2e-tests.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-get-package-list.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-npm-publish-lts-release.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-npm-publish-preid.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-npm-publish-release.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-prebuild-amplify-js.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-prebuild-samples-staging.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-release-verification.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-test-github-actions.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-test-license.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-test-tsc-compliance.yml:1
- Warn: no topLevel permission defined: .github/workflows/callable-unit-tests.yml:1
- Warn: no topLevel permission defined: .github/workflows/codeql.yml:1
- Warn: no topLevel permission defined: .github/workflows/issue-comment.yml:1
- Warn: no topLevel permission defined: .github/workflows/issue-labeled.yml:1
- Warn: no topLevel permission defined: .github/workflows/issue-opened.yml:1
- Warn: no topLevel permission defined: .github/workflows/lock.yaml:1
- Warn: no topLevel permission defined: .github/workflows/on-schedule-canary-test.yml:1
- Info: topLevel permissions set to 'read-all': .github/workflows/pr.yml:9
- Warn: no topLevel permission defined: .github/workflows/push-integ-test.yml:1
- Warn: no topLevel permission defined: .github/workflows/push-latest-release.yml:1
- Warn: no topLevel permission defined: .github/workflows/push-lts-release.yml:1
- Warn: no topLevel permission defined: .github/workflows/push-main-release.yml:1
- Warn: no topLevel permission defined: .github/workflows/push-next-release.yml:1
- Warn: no topLevel permission defined: .github/workflows/push-preid-release.yml:1
- Info: topLevel 'contents' permission set to 'read': .github/workflows/snyk-security.yml:10
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Score
7.2
/10
Last Scanned on 2025-01-27
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More