📐 Ts.ED is a Node.js and TypeScript framework on top of Express to write your application with TypeScript (or ES6). It provides a lot of decorators and guideline to make your code more readable and less error-prone. ⭐️ Star to support our work!
Installations
npm install @tsed/platform-serverless-http
Developer Guide
Typescript
No
Module System
ESM
Node Version
20.18.1
NPM Version
10.8.2
Releases
Contributors
Languages
TypeScript (97.53%)
JavaScript (1.58%)
EJS (0.7%)
HTML (0.1%)
CSS (0.09%)
Shell (0.01%)
Developer
Download Statistics
Total Downloads
209,665
Last Day
33
Last Week
963
Last Month
1,837
Last Year
137,560
GitHub Statistics
2,890 Stars
5,662 Commits
290 Forks
43 Watching
42 Branches
143 Contributors
Bundle Size
783.00 B
Minified
407.00 B
Minified + Gzipped
Package Meta Information
Latest Version
8.4.5
Package Id
@tsed/platform-serverless-http@8.4.5
Unpacked Size
18.88 kB
Size
6.62 kB
File Count
20
NPM Version
10.8.2
Node Version
20.18.1
Publised On
25 Jan 2025
Total Downloads
Cumulative downloads
Total Downloads
209,665
Last day
-61.2%
33
Compared to previous day
Last week
172.8%
963
Compared to previous week
Last month
20.1%
1,837
Compared to previous month
Last year
160.4%
137,560
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Dependencies
1
Peer Dependencies
8
A package of Ts.ED framework. See website: https://tsed.devtutorials/aws.html
Features
This package allows the creation of a Lambda AWS with an Express.js/Koa.js server.
It supports:
- Mounting Express.js/Koa.js app with
serverless-http
module, - DI injection with
@tsed/di
, - Models mapping using
@tsed/schema
and@tsed/json-mapper
, - Params decorators can be used from
@tsed/platform-params
to get Query, Body, etc... - Operation descriptions like
@Returns
, @tsed/async-hook-context
to inject Context anywhere in your class!
Installation
1npm install --save @tsed/platform-serverless-http serverless-http serverless-offline 2npm install --save-dev @types/aws-lambda
Configuration
In the src/lambda
create a new Lambda class:
1import {Controller, Inject} from "@tsed/di"; 2import {Get, Returns, Summary} from "@tsed/schema"; 3import {QueryParams} from "@tsed/platform-params"; 4import {TimeslotsService} from "../services/TimeslotsService.js"; 5import {TimeslotModel} from "../models/TimeslotModel.js"; 6 7@Controller("/timeslots") 8export class TimeslotsController { 9 @Inject() 10 protected timeslotsService: TimeslotsService; 11 12 @Get("/") 13 @Summary("Return a list of timeslots") 14 @(Returns(200, Array).Of(TimeslotModel)) 15 get(@QueryParams("date_start") dateStart: Date, @QueryParams("date_end") dateEnd: Date) { 16 return this.timeslotsService.find({ 17 dateStart, 18 dateEnd 19 }); 20 } 21}
Create new Server.ts
to configure your Ts.ED application:
1import {Configuration, Inject} from "@tsed/di"; 2import {PlatformApplication} from "@tsed/platform-http"; 3import cors from "cors"; 4import compress from "compression"; 5import cookieParser from "cookie-parser"; 6import methodOverride from "method-override"; 7import "@tsed/ajv"; 8import "@tsed/swagger"; 9import {TimeslotsController} from "./controllers/TimeslotsController.js"; 10 11@Configuration({ 12 acceptMimes: ["application/json"], 13 mount: { 14 "/": [TimeslotsController] 15 }, 16 swagger: [ 17 { 18 path: "/v3/docs", 19 specVersion: "3.0.1" 20 } 21 ], 22 views: { 23 root: "${rootDir}/views", 24 extensions: { 25 ejs: "ejs" 26 } 27 }, 28 middlewares: ["cors", "cookie-parser", "compression", "method-override", "json-parser", "urlencoded-parser"] 29}) 30export class Server {}
Create new handler.ts
to expose your lambda:
1import {PlatformServerless} from "@tsed/platform-serverless-http"; 2import {PlatformExpress} from "@tsed/platform-express"; 3import {Server} from "./Server.js"; 4 5const platform = PlatformServerless.bootstrap(Server, { 6 adapter: PlatformExpress 7}); 8 9export const handler = platform.handler();
Create also index.ts
to expose run Ts.ED on you local machine:
1import {PlatformExpress} from "@tsed/platform-express"; 2import {Server} from "./Server.js"; 3 4async function bootstrap() { 5 const platform = await PlatformExpress.bootstrap(Server, { 6 httpsPort: false, 7 httpPort: process.env.PORT || 3000, 8 disableComponentsScan: true 9 }); 10 11 await platform.listen(); 12 13 return platform; 14} 15 16bootstrap();
Finally, create the serverless.yml
:
1service: timeslots 2 3frameworkVersion: "2" 4 5provider: 6 name: aws 7 runtime: nodejs14.x 8 lambdaHashingVersion: "20201221" 9 10plugins: 11 - serverless-offline 12 13functions: 14 any: 15 handler: dist/handler.handler 16 events: 17 - http: 18 method: ANY 19 path: / 20 - http: 21 method: ANY 22 path: "{proxy+}"
Invoke a lambda with serverless
Serverless provide a plugin named serverless-offline
. This Serverless plugin emulates AWS λ and API Gateway on your
local machine to speed up your development cycles. To do so, it starts an HTTP server that handles the request's
lifecycle like API does and invokes your handlers.
So, by using the serverless offline
command, we'll be able to invoke our function. For that, we need also to build our
code before invoke the lambda.
To simplify our workflow, we can add the following npm script command in our package.json
:
1{ 2 "scripts": { 3 "invoke": "yarn serverless invoke local -f any --data '{\"path\":\"/timeslots\", \"httpMethod\": \"GET\"}'" 4 } 5}
Now, we can run the following command to invoke our lambda:
yarn invoke
// OR
npm run invoke
You should see in the terminal the following result:
1{ 2 "statusCode": 200, 3 "body": "[{\"id\":\"b6de4fc7-faaa-4cd7-a144-42f6af0dec6b\",\"title\":\"title\",\"description\":\"description\",\"start_date\":\"2021-10-29T10:40:57.019Z\",\"end_date\":\"2021-10-29T10:40:57.019Z\",\"created_at\":\"2021-10-29T10:40:57.019Z\",\"update_at\":\"2021-10-29T10:40:57.019Z\"}]", 4 "headers": { 5 "content-type": "application/json", 6 "x-request-id": "ebb52d5e-113b-40da-b34e-c14811df596b" 7 }, 8 "isBase64Encoded": false 9}
Get Aws Context and Aws Event
This package includes decorators to easily get the event object Lambda received from API Gateway:
1import {Controller} from "@tsed/di"; 2import {Get} from "@tsed/schema"; 3import {ServerlessEvent, ServerlessContext} from "@tsed/platform-serverless-http"; 4 5@Controller("/") 6class MyCtrl { 7 @Get("/") 8 get(@ServerlessEvent() event: any, @ServerlessContext() context: ServerlessContext) { 9 console.log("Event", event); 10 console.log("Context", context); 11 12 return {event, context}; 13 } 14}
Testing
Ts.ED provide a way to test you lambda with mocked Aws event and context by using the @@PlatformServerlessTest@@ util.
Here an example to test a Lambda controller:
1import {PlatformServerless} from "@tsed/platform-serverless-http"; 2import {PlatformServerlessTest} from "@tsed/platform-serverless-testing"; 3import {PlatformExpress} from "@tsed/platform-express"; 4import {Server} from "./Server.js"; 5 6@Controller("/timeslots") 7class TimeslotsController { 8 @Get("/") 9 getAll() { 10 return []; 11 } 12} 13 14describe("TimeslotsController", () => { 15 beforeEach( 16 PlatformServerlessTest.bootstrap(PlatformServerlessHttp, { 17 server: Server, 18 mount: { 19 "/": [TimeslotsLambdaController] 20 } 21 }) 22 ); 23 afterEach(() => PlatformServerlessTest.reset()); 24 25 it("should call getAll Lambda", async () => { 26 const response = await PlatformServerlessTest.request.get("/timeslots"); 27 28 expect(response.statusCode).toEqual(200); 29 expect(JSON.parse(response.body)).toEqual([]); 30 }); 31});
Contributors
Backers
Thank you to all our backers! 🙏 [Become a backer]
Sponsors
Support this project by becoming a sponsor. Your logo will show up here with a link to your website. [Become a sponsor]
License
The MIT License (MIT)
Copyright (c) 2016 - 2022 Romain Lenzotti
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
No vulnerabilities found.
Reason
30 commit(s) and 21 issue activity found in the last 90 days -- score normalized to 10
Reason
no dangerous workflow patterns detected
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
no binaries found in the repo
Reason
SAST tool detected but not run on all commits
Details
- Info: SAST configuration detected: CodeQL
- Warn: 18 commits out of 19 are checked with a SAST tool
Reason
Found 3/21 approved changesets -- score normalized to 1
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Warn: no topLevel permission defined: .github/workflows/benchmarks.yml:1
- Warn: no topLevel permission defined: .github/workflows/build.yml:1
- Warn: no topLevel permission defined: .github/workflows/close-issue-message.yml:1
- Warn: no topLevel permission defined: .github/workflows/code-ql.yml:1
- Warn: no topLevel permission defined: .github/workflows/rebase.yml:1
- Info: topLevel 'contents' permission set to 'read': .github/workflows/website.yml:7
- Info: no jobLevel write permissions found
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
- Warn: no security policy file detected
- Warn: no security file to analyze
- Warn: no security file to analyze
- Warn: no security file to analyze
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/benchmarks.yml:16: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/benchmarks.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/benchmarks.yml:19: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/benchmarks.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/benchmarks.yml:60: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/benchmarks.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:25: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:27: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:44: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:48: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:59: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:253: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:255: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:260: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:285: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:287: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:77: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:81: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:92: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:107: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:111: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:122: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:136: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:140: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:151: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:165: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:169: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:180: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:194: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:198: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:209: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:223: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:227: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:238: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/build.yml/production?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/close-issue-message.yml:9: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/close-issue-message.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/code-ql.yml:25: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/code-ql.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/code-ql.yml:29: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/code-ql.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/code-ql.yml:37: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/code-ql.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/code-ql.yml:51: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/code-ql.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/rebase.yml:12: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/rebase.yml/production?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/rebase.yml:16: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/rebase.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/website.yml:15: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/website.yml/production?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/website.yml:17: update your workflow using https://app.stepsecurity.io/secureworkflow/tsedio/tsed/website.yml/production?enable=pin
- Info: 0 out of 38 GitHub-owned GitHubAction dependencies pinned
- Info: 0 out of 2 third-party GitHubAction dependencies pinned
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
86 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-wf5p-g6vw-rhxx
- Warn: Project is vulnerable to: GHSA-qwcr-r2fm-qrc7
- Warn: Project is vulnerable to: GHSA-x9w5-v3q2-3rhw
- Warn: Project is vulnerable to: GHSA-pxg6-pf52-xh8x
- Warn: Project is vulnerable to: GHSA-36jr-mh4h-2g58
- Warn: Project is vulnerable to: GHSA-wm7h-9275-46v2
- Warn: Project is vulnerable to: GHSA-4gmj-3p3h-gm8h
- Warn: Project is vulnerable to: GHSA-rv95-896h-c2vc
- Warn: Project is vulnerable to: GHSA-qw6h-vgh9-j6wx
- Warn: Project is vulnerable to: GHSA-3fjj-p79j-c9hh
- Warn: Project is vulnerable to: GHSA-pfrx-2q88-qq97
- Warn: Project is vulnerable to: GHSA-2p57-rm9w-gvfp
- Warn: Project is vulnerable to: GHSA-9wv6-86v2-598j
- Warn: Project is vulnerable to: GHSA-rhx6-c78j-4q9w
- Warn: Project is vulnerable to: GHSA-p8p7-x288-28g6
- Warn: Project is vulnerable to: GHSA-m6fv-jmcg-4jfg
- Warn: Project is vulnerable to: GHSA-cm22-4g7w-348p
- Warn: Project is vulnerable to: GHSA-72xf-g2v4-qvf3
- Warn: Project is vulnerable to: GHSA-93q8-gq69-wqmw
- Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275
- Warn: Project is vulnerable to: GHSA-mhxj-85r3-2x55
- Warn: Project is vulnerable to: GHSA-896r-f27r-55mw
- Warn: Project is vulnerable to: GHSA-9c47-m6qq-7p4h
- Warn: Project is vulnerable to: GHSA-pppg-cpfq-h7wr
- Warn: Project is vulnerable to: GHSA-8cf7-32gw-wr33
- Warn: Project is vulnerable to: GHSA-hjrf-2m68-5959
- Warn: Project is vulnerable to: GHSA-qwph-4952-7xr6
- Warn: Project is vulnerable to: GHSA-952p-6rrq-rcjv
- Warn: Project is vulnerable to: GHSA-f8q6-p94x-37v3
- Warn: Project is vulnerable to: GHSA-mwcw-c2x4-8c55
- Warn: Project is vulnerable to: GHSA-r683-j2x4-v87g
- Warn: Project is vulnerable to: GHSA-6fx8-h7jm-663j
- Warn: Project is vulnerable to: GHSA-h755-8qp9-cq85
- Warn: Project is vulnerable to: GHSA-hrpp-h998-j3pp
- Warn: Project is vulnerable to: GHSA-c2qf-rxjj-qqgw
- Warn: Project is vulnerable to: GHSA-wpg7-2c88-r8xv
- Warn: Project is vulnerable to: GHSA-3f95-r44v-8mrg
- Warn: Project is vulnerable to: GHSA-28xr-mwxg-3qc8
- Warn: Project is vulnerable to: GHSA-9p95-fxvg-qgq2
- Warn: Project is vulnerable to: GHSA-9w5j-4mwv-2wj8
- Warn: Project is vulnerable to: GHSA-4vvj-4cpr-p986 / GHSA-64vr-g452-qvp3
- Warn: Project is vulnerable to: GHSA-3h5v-q93c-6h6q
- Warn: Project is vulnerable to: GHSA-776f-qx25-q3cc
- Warn: Project is vulnerable to: GHSA-77xq-cpvg-7xm2
- Warn: Project is vulnerable to: GHSA-8hc4-vh64-cxmj
- Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg
- Warn: Project is vulnerable to: GHSA-488m-6gh8-9j36
- Warn: Project is vulnerable to: GHSA-jj6g-7j8p-7gf2
- Warn: Project is vulnerable to: GHSA-wxhq-pm8v-cw75
- Warn: Project is vulnerable to: GHSA-6cpc-mj5c-m9rq
- Warn: Project is vulnerable to: GHSA-r32x-jhw5-g48p
- Warn: Project is vulnerable to: GHSA-phwq-j96m-2c2q
- Warn: Project is vulnerable to: GHSA-ghr5-ch3p-vcr6
- Warn: Project is vulnerable to: GHSA-9pv7-vfvm-6vr7
- Warn: Project is vulnerable to: GHSA-m7mf-vm62-7x3q
- Warn: Project is vulnerable to: GHSA-pfq8-rq6v-vf5m
- Warn: Project is vulnerable to: GHSA-c7qv-q95q-8v27
- Warn: Project is vulnerable to: GHSA-78xj-cgh5-2h22
- Warn: Project is vulnerable to: GHSA-jv3g-j58f-9mq9
- Warn: Project is vulnerable to: GHSA-hhhv-q57g-882q
- Warn: Project is vulnerable to: GHSA-76p3-8jx3-jpfq
- Warn: Project is vulnerable to: GHSA-3rfm-jhwj-7488
- Warn: Project is vulnerable to: GHSA-hhq3-ff78-jv3g
- Warn: Project is vulnerable to: GHSA-vh95-rmgr-6w4m
- Warn: Project is vulnerable to: GHSA-xvch-5gv4-984h
- Warn: Project is vulnerable to: GHSA-m7xq-9374-9rvx
- Warn: Project is vulnerable to: GHSA-vg7j-7cwx-8wgw
- Warn: Project is vulnerable to: GHSA-gcx4-mw62-g8wm
- Warn: Project is vulnerable to: GHSA-q8j6-pwqx-pm96
- Warn: Project is vulnerable to: GHSA-2rq5-699j-x7p6
- Warn: Project is vulnerable to: GHSA-f5x3-32g6-xq36
- Warn: Project is vulnerable to: GHSA-pgw7-wx7w-2w33
- Warn: Project is vulnerable to: GHSA-3cvr-822r-rqcc
- Warn: Project is vulnerable to: GHSA-q768-x9m6-m9qp
- Warn: Project is vulnerable to: GHSA-8qr4-xgw6-wmr3
- Warn: Project is vulnerable to: GHSA-f772-66g8-q5h3
- Warn: Project is vulnerable to: GHSA-5r9g-qh6m-jxff
- Warn: Project is vulnerable to: GHSA-r6ch-mqf9-qc9w
- Warn: Project is vulnerable to: GHSA-wqq4-5wpv-mx2g
- Warn: Project is vulnerable to: GHSA-3787-6prv-h9w3
- Warn: Project is vulnerable to: GHSA-9qxr-qj54-h672
- Warn: Project is vulnerable to: GHSA-m4v8-wqvr-p9f7
- Warn: Project is vulnerable to: GHSA-c76h-2ccp-4975
- Warn: Project is vulnerable to: GHSA-9cwx-2883-4wfx
- Warn: Project is vulnerable to: GHSA-vg6x-rcgg-rjx6
- Warn: Project is vulnerable to: GHSA-wr3j-pwj9-hqq6
Score
4.5
/10
Last Scanned on 2025-01-27
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More