Gathering detailed insights and metrics for better-sqlite3-multiple-ciphers
Gathering detailed insights and metrics for better-sqlite3-multiple-ciphers
Gathering detailed insights and metrics for better-sqlite3-multiple-ciphers
Gathering detailed insights and metrics for better-sqlite3-multiple-ciphers
@electron-prebuilds-preview/better-sqlite3-multiple-ciphers
better-sqlite3 with multiple-cipher encryption support
@tdole/better-sqlite3-multiple-ciphers
better-sqlite3 with multiple-cipher encryption support
better-sqlite3-multiple-ciphers-helper
A wrapper library that eases the work with better-sqlite3-multiple-ciphers with some new functions and a migration-system
better-sqlite3 with multiple-cipher encryption support 🔒
npm install better-sqlite3-multiple-ciphers
Typescript
Module System
Node Version
NPM Version
74
Supply Chain
98.2
Quality
84.3
Maintenance
100
Vulnerability
99.3
License
C++ (54.27%)
JavaScript (45.48%)
Python (0.19%)
Dockerfile (0.06%)
Total Downloads
210,155
Last Day
379
Last Week
2,108
Last Month
9,996
Last Year
137,883
MIT License
177 Stars
1,590 Commits
31 Forks
4 Watchers
13 Branches
31 Contributors
Updated on Apr 24, 2025
Minified
Minified + Gzipped
Latest Version
11.9.1
Package Id
better-sqlite3-multiple-ciphers@11.9.1
Unpacked Size
13.33 MB
Size
3.07 MB
File Count
29
NPM Version
10.1.0
Node Version
20.8.1
Published on
Mar 18, 2025
Cumulative downloads
Total Downloads
Last Day
-3.6%
379
Compared to previous day
Last Week
-8.7%
2,108
Compared to previous week
Last Month
-10.7%
9,996
Compared to previous month
Last Year
151.4%
137,883
Compared to previous year
The fastest and simplest library for SQLite in Node.js. This particular fork supports multiple-cipher encryption using SQLite3MultipleCiphers. Check usage to learn more.
11.0.0-beta.0
11.0.0
3.46.0
1.8.5
better-sqlite3
is used by thousands of developers and engineers on a daily basis. Long nights and weekends were spent keeping this project strong and dependable, with no ask for compensation or funding, until now. If your company uses better-sqlite3
, ask your manager to consider supporting the project:
Also head over to SQLite3MultipleCiphers repo and give some support to the developer to keep this very useful extension alive.
You can also support me (the author/maintainer of this fork) by buying me a coffee. 😊
Wise is the preferred method for donations because PayPal takes a huge chunk (~22%) off of every donation (ko-fi also uses PayPal).
Other donation methods:
select 1 row get() | select 100 rows all() | select 100 rows iterate() 1-by-1 | insert 1 row run() | insert 100 rows in a transaction | |
---|---|---|---|---|---|
better-sqlite3 | 1x | 1x | 1x | 1x | 1x |
sqlite and sqlite3 | 11.7x slower | 2.9x slower | 24.4x slower | 2.8x slower | 15.6x slower |
You can verify these results by running the benchmark yourself.
1npm install better-sqlite3-multiple-ciphers
1npm install better-sqlite3-multiple-ciphers@beta
You must be using Node.js v14.21.1 or above. Prebuilt binaries are available for Node.js LTS versions and Electron. If you have trouble installing, check the troubleshooting guide.
1const db = require('better-sqlite3-multiple-ciphers')('foobar.db', options); 2 3const row = db.prepare('SELECT * FROM users WHERE id = ?').get(userId); 4console.log(row.firstName, row.lastName, row.email);
Though not required, it is generally important to set the WAL pragma for performance reasons.
1db.pragma('journal_mode = WAL');
1import Database from 'better-sqlite3-multiple-ciphers'; 2const db = new Database('foobar.db', options); 3db.pragma('journal_mode = WAL');
A database can be encrypted and decrypted simply using key
and rekey
PRAGMA
statements.
Running this will encrypt the database using the default cipher (sqleet):
1const db = require('better-sqlite3-multiple-ciphers')('foobar.db', options); 2 3db.pragma(`rekey='secret-key'`); 4db.close();
To read an encrypted database (assuming default cipher):
1const db = require('better-sqlite3-multiple-ciphers')('foobar.db', options); 2 3db.pragma(`key='secret-key'`); 4const row = db.prepare('SELECT * FROM users WHERE id = ?').get(userId); 5console.log(row.firstName, row.lastName, row.email);
To read an encrypted database (legacy SQLCipher) created by tools like DB Browser for SQLite:
1const db = require('better-sqlite3-multiple-ciphers')('foobar.db', options); 2 3db.pragma(`cipher='sqlcipher'`) 4db.pragma(`legacy=4`) 5db.pragma(`key='secret-key'`); 6const row = db.prepare('SELECT * FROM users WHERE id = ?').get(userId); 7console.log(row.firstName, row.lastName, row.email);
The same method should be used if you want to create a new encrypted database that can be opened using DB Browser for SQLite.
You can also use key()
and rekey()
functions for encryption and decryption tasks.
GUI database editors:
Even though better-sqlite3-multiple-ciphers
supports opening databases created
using DB Browser for SQLite, it only supports creating/editing legacy
SQLCipher databases which means, it's highly likely that you won't be able to open a database created
using better-sqlite3-multiple-ciphers
in DB Browser for SQLite.
To visually edit databases created using better-sqlite3-multiple-ciphers
regardless of the cipher configuration, it's
recommended to use a tool like SQLiteStudio because it also
uses SQLite3MultipleCiphers under the hood.
node-sqlite3
uses asynchronous APIs for tasks that are either CPU-bound or serialized. That's not only bad design, but it wastes tons of resources. It also causes mutex thrashing which has devastating effects on performance.node-sqlite3
exposes low-level (C language) memory management functions. better-sqlite3
does it the JavaScript way, allowing the garbage collector to worry about memory management.better-sqlite3
is simpler to use, and it provides nice utilities for some operations that are very difficult or impossible in node-sqlite3
.better-sqlite3
is much faster than node-sqlite3
in most cases, and just as fast in all other cases.In most cases, if you're attempting something that cannot be reasonably accomplished with better-sqlite3
, it probably cannot be reasonably accomplished with SQLite in general. For example, if you're executing queries that take one second to complete, and you expect to have many concurrent users executing those queries, no amount of asynchronicity will save you from SQLite's serialized nature. Fortunately, SQLite is very very fast. With proper indexing, we've been able to achieve upward of 2000 queries per second with 5-way-joins in a 60 GB database, where each query was handling 5–50 kilobytes of real data.
If you have a performance problem, the most likely causes are inefficient queries, improper indexing, or a lack of WAL mode—not better-sqlite3
itself. However, there are some cases where better-sqlite3
could be inappropriate:
For these situations, you should probably use a full-fledged RDBMS such as PostgreSQL.
Upgrading your better-sqlite3-multiple-ciphers
dependency can potentially introduce breaking changes, either in the better-sqlite3-multiple-ciphers
API (if you upgrade to a new major version), or between your existing database(s) and the underlying version of SQLite. Before upgrading, review:
No vulnerabilities found.
No security vulnerabilities found.