Installations
npm install aws-analytics-reference-architecture
Developer Guide
Typescript
Yes
Module System
CommonJS
Node Version
20.5.1
NPM Version
9.8.0
Score
63.2
Supply Chain
88.1
Quality
76.1
Maintenance
50
Vulnerability
73.6
License
Releases
Contributors
Unable to fetch Contributors
Languages
TypeScript (50.75%)
Python (24.81%)
Java (14.46%)
Scala (7.02%)
PLpgSQL (1.82%)
JavaScript (1.07%)
Batchfile (0.03%)
Shell (0.02%)
validate.email 🚀
Verify real, reachable, and deliverable emails with instant MX records, SMTP checks, and disposable email detection.
Developer
Download Statistics
Total Downloads
164,865
Last Day
33
Last Week
415
Last Month
1,627
Last Year
71,162
GitHub Statistics
NOASSERTION License
158 Stars
358 Commits
45 Forks
8 Watchers
24 Branches
36 Contributors
Updated on Nov 15, 2024
Bundle Size
196.48 kB
Minified
48.67 kB
Minified + Gzipped
Package Meta Information
Latest Version
2.12.13
Package Id
aws-analytics-reference-architecture@2.12.13
Unpacked Size
403.46 MB
Size
117.28 MB
File Count
10,969
NPM Version
9.8.0
Node Version
20.5.1
Published on
Feb 29, 2024
Total Downloads
Cumulative downloads
Total Downloads
164,865
Last Day
0%
33
Compared to previous day
Last Week
59.6%
415
Compared to previous week
Last Month
-23.8%
1,627
Compared to previous month
Last Year
30%
71,162
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Dependencies
7
Peer Dependencies
4
Dev Dependencies
38
AWS Analytics Reference Architecture
The AWS Analytics Reference Architecture is a set of analytics solutions put together as end-to-end examples. It regroups AWS best practices for designing, implementing, and operating analytics platforms through different purpose-built patterns, handling common requirements, and solving customers' challenges.
This project is composed of:
- Reusable core components exposed in an AWS CDK (Cloud Development Kit) library currently available in Typescript and Python. This library contains AWS CDK constructs that can be used to quickly provision analytics solutions in demos, prototypes, proof of concepts and end-to-end reference architectures.
- Reference architectures consumming the reusable components to demonstrate end-to-end examples in a business context. Currently, the AWS native reference architecture is available.
This documentation explains how to get started with the core components of the AWS Analytics Reference Architecture.
Getting started
Prerequisites
- Create an AWS account
- The core components can be deployed in any AWS region
- Install the following components with the specified version on the machine from which the deployment will be executed:
- Python [3.8-3.9.2] or Typescript
- AWS CDK v2: Please refer to the Getting started guide.
- Bootstrap AWS CDK in your region (here eu-west-1). It will provision resources required to deploy AWS CDK applications
1export ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text) 2export AWS_REGION=eu-west-1 3cdk bootstrap aws://$ACCOUNT_ID/$AWS_REGION
Initialization (in Python)
- Initialize a new AWS CDK application in Python and use a virtual environment to install dependencies
1mkdir my_demo 2cd my_demo 3cdk init app --language python 4python3 -m venv .env 5source .env/bin/activate
- Add the AWS Analytics Reference Architecture library in the dependencies of your project. Update requirements.txt
1aws-cdk-lib==2.51.0 2constructs>=10.0.0,<11.0.0 3aws_analytics_reference_architecture>=2.0.0
- Install The Packages via pip
1python -m pip install -r requirements.txt
Development
- Import the AWS Analytics Reference Architecture in your code in my_demo/my_demo_stack.py
1import aws_analytics_reference_architecture as ara
- Now you can use all the constructs available from the core components library to quickly provision resources in your AWS CDK stack. For example:
- The DataLakeStorage to provision a full set of pre-configured Amazon S3 Bucket for a data lake
1 # Create a new DataLakeStorage with Raw, Clean and Transform buckets configured with data lake best practices 2 storage = ara.DataLakeStorage (self,"storage")
- The DataLakeCatalog to provision a full set of AWS Glue databases for registring tables in your data lake
1 # Create a new DataLakeCatalog with Raw, Clean and Transform databases 2 catalog = ara.DataLakeCatalog (self,"catalog")
- The DataGenerator to generate live data in the data lake from a pre-configured retail dataset
1 # Generate the Sales Data 2 sales_data = ara.BatchReplayer( 3 scope=self, 4 id="sale-data", 5 dataset=ara.PreparedDataset.RETAIL_1_GB_STORE_SALE, 6 sink_object_key="sale", 7 sink_bucket=storage.raw_bucket, 8 ) 9
1 # Generate the Customer Data 2 customer_data = ara.BatchReplayer( 3 scope=self, 4 id="customer-data", 5 dataset=ara.PreparedDataset.RETAIL_1_GB_CUSTOMER, 6 sink_object_key="customer", 7 sink_bucket=storage.raw_bucket, 8 ) 9
- Additionally, the library provides some helpers to quickly run demos:
1 # Configure defaults for Athena console 2 athena_defaults = ara.AthenaDemoSetup(scope=self, id="demo_setup")
1 # Configure a default role for AWS Glue jobs 2 ara.GlueDemoRole.get_or_create(self)
Deployment
Deploy the AWS CDK application
1cdk deploy
The time to deploy the application is depending on the constructs you are using
Cleanup
Delete the AWS CDK application
1cdk destroy
API Reference
More contructs, helpers and datasets are available in the AWS Analytics Reference Architecture. See the full API specification here
Contributing
Please refer to the contributing guidelines and contributing FAQ for details.
License Summary
The documentation is made available under the Creative Commons Attribution-ShareAlike 4.0 International License. See the LICENSE file.
The sample code within this documentation is made available under the MIT-0 license. See the LICENSE-SAMPLECODE file.

No vulnerabilities found.
Reason
no dangerous workflow patterns detected
Reason
security policy file detected
Details
- Info: security policy file detected: github.com/aws-samples/.github/SECURITY.md:1
- Info: Found linked content: github.com/aws-samples/.github/SECURITY.md:1
- Info: Found disclosure, vulnerability, and/or timelines in security policy: github.com/aws-samples/.github/SECURITY.md:1
- Info: Found text in security policy: github.com/aws-samples/.github/SECURITY.md:1
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Warn: project license file does not contain an FSF or OSI license.
Reason
binaries present in source code
Details
- Warn: binary detected: core/src/db-schema-manager/resources/flyway-lambda/gradle/wrapper/gradle-wrapper.jar:1
- Warn: binary detected: core/src/db-schema-manager/resources/flyway-lambda/libs/redshift-jdbc42-1.2.55.1083.jar:1
Reason
Found 4/12 approved changesets -- score normalized to 3
Reason
project is archived
Details
- Warn: Repository is archived.
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Info: jobLevel 'contents' permission set to 'read': .github/workflows/release.yml:74
- Info: jobLevel 'contents' permission set to 'read': .github/workflows/release.yml:95
- Warn: jobLevel 'contents' permission set to 'write': .github/workflows/release.yml:11
- Warn: jobLevel 'contents' permission set to 'write': .github/workflows/release.yml:51
- Warn: jobLevel 'contents' permission set to 'write': .github/workflows/upgrade-dependencies.yml:41
- Warn: jobLevel 'checks' permission set to 'write': .github/workflows/upgrade-dependencies.yml:43
- Info: jobLevel 'contents' permission set to 'read': .github/workflows/upgrade-dependencies.yml:11
- Warn: no topLevel permission defined: .github/workflows/build.yml:1
- Warn: no topLevel permission defined: .github/workflows/dependabot-auto-approval.yml:1
- Warn: no topLevel permission defined: .github/workflows/documentation.yml:1
- Warn: no topLevel permission defined: .github/workflows/pull-request-lint.yml:1
- Warn: no topLevel permission defined: .github/workflows/release.yml:1
- Warn: no topLevel permission defined: .github/workflows/upgrade-dependencies.yml:1
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:12: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/build.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:17: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/build.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/build.yml/main?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/dependabot-auto-approval.yml:9: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/dependabot-auto-approval.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/documentation.yml:10: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/documentation.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/documentation.yml:11: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/documentation.yml/main?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/pull-request-lint.yml:20: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/pull-request-lint.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/release.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:26: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/release.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:40: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/release.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:55: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/release.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:78: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/release.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:99: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/release.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/upgrade-dependencies.yml:16: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/upgrade-dependencies.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/upgrade-dependencies.yml:30: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/upgrade-dependencies.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/upgrade-dependencies.yml:46: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/upgrade-dependencies.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/upgrade-dependencies.yml:48: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/upgrade-dependencies.yml/main?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/upgrade-dependencies.yml:57: update your workflow using https://app.stepsecurity.io/secureworkflow/aws-samples/aws-analytics-reference-architecture/upgrade-dependencies.yml/main?enable=pin
- Warn: pipCommand not pinned by hash: .github/workflows/documentation.yml:15
- Info: 0 out of 15 GitHub-owned GitHubAction dependencies pinned
- Info: 0 out of 3 third-party GitHubAction dependencies pinned
- Info: 0 out of 1 pipCommand dependencies pinned
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
- Warn: 0 commits out of 28 are checked with a SAST tool
Reason
141 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-34jh-p97f-mpxf
- Warn: Project is vulnerable to: PYSEC-2023-212 / GHSA-g4mx-q9vg-27p4
- Warn: Project is vulnerable to: PYSEC-2023-192 / GHSA-v845-jxx5-vc9f
- Warn: Project is vulnerable to: GHSA-968p-4wvh-cqc8
- Warn: Project is vulnerable to: GHSA-v4mq-x674-ff73
- Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg
- Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275
- Warn: Project is vulnerable to: GHSA-67mh-4wv8-2f99
- Warn: Project is vulnerable to: GHSA-952p-6rrq-rcjv
- Warn: Project is vulnerable to: GHSA-f5x3-32g6-xq36
- Warn: Project is vulnerable to: GHSA-3h5v-q93c-6h6q
- Warn: Project is vulnerable to: GHSA-c28r-hw5m-5gv3
- Warn: Project is vulnerable to: GHSA-288c-cq4h-88gq
- Warn: Project is vulnerable to: GHSA-4gq5-ch57-c2mg
- Warn: Project is vulnerable to: GHSA-4w82-r329-3q67
- Warn: Project is vulnerable to: GHSA-57j2-w4cx-62h2
- Warn: Project is vulnerable to: GHSA-5949-rw7g-wx7w
- Warn: Project is vulnerable to: GHSA-5r5r-6hpj-8gg9
- Warn: Project is vulnerable to: GHSA-6fpp-rgj9-8rwc
- Warn: Project is vulnerable to: GHSA-89qr-369f-5m5x
- Warn: Project is vulnerable to: GHSA-8c4j-34r4-xr8g
- Warn: Project is vulnerable to: GHSA-8w26-6f25-cm9x
- Warn: Project is vulnerable to: GHSA-9gph-22xh-8x98
- Warn: Project is vulnerable to: GHSA-9m6f-7xcq-8vf8
- Warn: Project is vulnerable to: GHSA-cggj-fvv3-cqwv
- Warn: Project is vulnerable to: GHSA-cjjf-94ff-43w7
- Warn: Project is vulnerable to: GHSA-cvm9-fjm9-3572
- Warn: Project is vulnerable to: GHSA-f3j5-rmmp-3fc5
- Warn: Project is vulnerable to: GHSA-f9xh-2qgp-cq57
- Warn: Project is vulnerable to: GHSA-fqwf-pjwf-7vqv
- Warn: Project is vulnerable to: GHSA-gww7-p5w4-wrfv
- Warn: Project is vulnerable to: GHSA-h3cw-g4mq-c5x2
- Warn: Project is vulnerable to: GHSA-jjjh-jjxp-wpff
- Warn: Project is vulnerable to: GHSA-m6x4-97wx-4q27
- Warn: Project is vulnerable to: GHSA-p43x-xfjf-5jhr
- Warn: Project is vulnerable to: GHSA-q93h-jc49-78gg
- Warn: Project is vulnerable to: GHSA-qjw2-hr98-qgfh
- Warn: Project is vulnerable to: GHSA-qr7j-h6gg-jmgc
- Warn: Project is vulnerable to: GHSA-r3gr-cxrf-hg25
- Warn: Project is vulnerable to: GHSA-r695-7vr9-jgc2
- Warn: Project is vulnerable to: GHSA-rfx6-vp9g-rh7v
- Warn: Project is vulnerable to: GHSA-rgv9-q543-rqg4
- Warn: Project is vulnerable to: GHSA-rpr3-cw39-3pxh
- Warn: Project is vulnerable to: GHSA-v585-23hc-c647
- Warn: Project is vulnerable to: GHSA-vfqx-33qm-g869
- Warn: Project is vulnerable to: GHSA-w3f4-3q6j-rh82
- Warn: Project is vulnerable to: GHSA-wh8g-3j2c-rqj5
- Warn: Project is vulnerable to: GHSA-xmc8-26q4-qjhx
- Warn: Project is vulnerable to: GHSA-3f7h-mf4q-vrm4
- Warn: Project is vulnerable to: GHSA-4jrv-ppp4-jm57
- Warn: Project is vulnerable to: GHSA-5mg8-w23w-74h3
- Warn: Project is vulnerable to: GHSA-7g45-4rm6-3mm3
- Warn: Project is vulnerable to: GHSA-mvr2-9pj6-7w5j
- Warn: Project is vulnerable to: GHSA-4gg5-vx3j-xwc7
- Warn: Project is vulnerable to: GHSA-735f-pc8j-v9w8
- Warn: Project is vulnerable to: GHSA-77rm-9x9h-xj3g
- Warn: Project is vulnerable to: GHSA-g5ww-5jh7-63cx
- Warn: Project is vulnerable to: GHSA-h4h5-3hr4-j3g2
- Warn: Project is vulnerable to: GHSA-wrvw-hg22-4m67
- Warn: Project is vulnerable to: GHSA-3vrc-rrpw-r5pw
- Warn: Project is vulnerable to: GHSA-gvpg-vgmx-xg6w
- Warn: Project is vulnerable to: GHSA-w33c-445m-f8w7
- Warn: Project is vulnerable to: GHSA-78wr-2p64-hpwj
- Warn: Project is vulnerable to: GHSA-gwrp-pvrq-jmwv
- Warn: Project is vulnerable to: GHSA-cgp8-4m63-fhh5
- Warn: Project is vulnerable to: GHSA-5mcr-gq6c-3hq2
- Warn: Project is vulnerable to: GHSA-9vjp-v76f-g363
- Warn: Project is vulnerable to: GHSA-cqqj-4p63-rrmm
- Warn: Project is vulnerable to: GHSA-f256-j965-7f32
- Warn: Project is vulnerable to: GHSA-grg4-wf29-r9vv
- Warn: Project is vulnerable to: GHSA-p2v9-g2qv-p635
- Warn: Project is vulnerable to: GHSA-wm47-8v5p-wjpj
- Warn: Project is vulnerable to: GHSA-wx5j-54mm-rqqq
- Warn: Project is vulnerable to: GHSA-269q-hmxg-m83q
- Warn: Project is vulnerable to: GHSA-5jpm-x58v-624v
- Warn: Project is vulnerable to: GHSA-xpw8-rcwv-8f8p
- Warn: Project is vulnerable to: GHSA-389x-839f-4rhx
- Warn: Project is vulnerable to: GHSA-xq3w-v528-46rv
- Warn: Project is vulnerable to: GHSA-6mjq-h674-j845
- Warn: Project is vulnerable to: GHSA-2qrg-x229-3v8q
- Warn: Project is vulnerable to: GHSA-65fg-84f6-3jq3
- Warn: Project is vulnerable to: GHSA-f7vh-qwp3-x37m
- Warn: Project is vulnerable to: GHSA-fp5r-v3w9-4333
- Warn: Project is vulnerable to: GHSA-w9p3-5cr8-m3jj
- Warn: Project is vulnerable to: GHSA-493p-pfq6-5258
- Warn: Project is vulnerable to: GHSA-v528-7hrm-frqp
- Warn: Project is vulnerable to: GHSA-r7pg-v2c8-mfg3
- Warn: Project is vulnerable to: GHSA-rhrv-645h-fjfh
- Warn: Project is vulnerable to: GHSA-4265-ccf5-phj5
- Warn: Project is vulnerable to: GHSA-4g9r-vxhx-9pgx
- Warn: Project is vulnerable to: GHSA-599f-7c49-w659
- Warn: Project is vulnerable to: GHSA-f5fw-25gw-5m92
- Warn: Project is vulnerable to: GHSA-gx2c-fvhc-ph4j
- Warn: Project is vulnerable to: GHSA-58jx-f5rf-qgqf
- Warn: Project is vulnerable to: GHSA-7r82-7xv7-xcpj
- Warn: Project is vulnerable to: GHSA-8489-44mv-ggj8
- Warn: Project is vulnerable to: GHSA-7286-pgfv-vxvh
- Warn: Project is vulnerable to: GHSA-c27h-mcmw-48hv
- Warn: Project is vulnerable to: GHSA-r6j9-8759-g62w
- Warn: Project is vulnerable to: GHSA-56h3-78gp-v83r
- Warn: Project is vulnerable to: GHSA-7rf3-mqpx-h7xg
- Warn: Project is vulnerable to: GHSA-grr4-wv38-f68w
- Warn: Project is vulnerable to: GHSA-q6g2-g7f3-rr83
- Warn: Project is vulnerable to: GHSA-x27m-9w8j-5vcw
- Warn: Project is vulnerable to: GHSA-2cqf-6xv9-f22w
- Warn: Project is vulnerable to: GHSA-2hjr-vmf3-xwvp
- Warn: Project is vulnerable to: GHSA-3393-hvrj-w7v3
- Warn: Project is vulnerable to: GHSA-5v8f-xx9m-wj44
- Warn: Project is vulnerable to: GHSA-62ww-4p3p-7fhj
- Warn: Project is vulnerable to: GHSA-c77j-p484-h84m
- Warn: Project is vulnerable to: GHSA-cqgv-256r-m9r8
- Warn: Project is vulnerable to: GHSA-fj32-6v7m-57pg
- Warn: Project is vulnerable to: GHSA-g9fw-9x87-rmrj
- Warn: Project is vulnerable to: GHSA-hr65-qq6p-87r4
- Warn: Project is vulnerable to: GHSA-jgx4-7v3v-vwfm
- Warn: Project is vulnerable to: GHSA-jqm6-m3j3-8gg9
- Warn: Project is vulnerable to: GHSA-r9fv-qpm9-rj4g
- Warn: Project is vulnerable to: GHSA-55g7-9cwv-5qfv
- Warn: Project is vulnerable to: GHSA-fjpj-2g6w-x25r
- Warn: Project is vulnerable to: GHSA-pqr6-cmr2-h8hf
- Warn: Project is vulnerable to: GHSA-qcwq-55hx-v3vh
- Warn: Project is vulnerable to: GHSA-3mc7-4q67-w48m
- Warn: Project is vulnerable to: GHSA-98wm-3w3q-mw94
- Warn: Project is vulnerable to: GHSA-9w3m-gqgf-c4p9
- Warn: Project is vulnerable to: GHSA-c4r9-r8fh-9vj2
- Warn: Project is vulnerable to: GHSA-hhhw-99gj-p3c3
- Warn: Project is vulnerable to: GHSA-mjmj-j48q-9wg2
- Warn: Project is vulnerable to: GHSA-rvwf-54qp-4r6v
- Warn: Project is vulnerable to: GHSA-w37g-rhq8-7m4j
- Warn: Project is vulnerable to: GHSA-264p-99wq-f4j6
- Warn: Project is vulnerable to: PYSEC-2019-217 / GHSA-462w-v97r-4m45
- Warn: Project is vulnerable to: PYSEC-2014-8 / GHSA-8r7q-cvjq-x353
- Warn: Project is vulnerable to: GHSA-cpwx-vrp4-4pq7
- Warn: Project is vulnerable to: PYSEC-2014-82 / GHSA-fqh9-2qgg-h84h
- Warn: Project is vulnerable to: PYSEC-2021-66 / GHSA-g3rq-g295-4j3m
- Warn: Project is vulnerable to: GHSA-h5c8-rqwp-cp95
- Warn: Project is vulnerable to: GHSA-h75v-3vvj-5mfj
- Warn: Project is vulnerable to: PYSEC-2019-220 / GHSA-hj2j-77xm-mc5v
- Warn: Project is vulnerable to: GHSA-q2x7-8rv6-6q7h
- Warn: Project is vulnerable to: GHSA-9wx4-h78v-vm56
- Warn: Project is vulnerable to: PYSEC-2023-74 / GHSA-j8r2-6x86-q33q
Score
3.5
/10
Last Scanned on 2025-03-10
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More