🎮 GraphQL IDE for better development workflows (GraphQL Subscriptions, interactive docs & collaboration)
Installations
npm install graphql-playground-html
Developer
graphcool
Developer Guide
Module System
CommonJS
Min. Node Version
Typescript Support
No
Node Version
16.13.0
NPM Version
lerna/3.22.0/node@v16.13.0+arm64 (darwin)
Statistics
8,779 Stars
1,099 Commits
736 Forks
83 Watching
33 Branches
117 Contributors
Updated on 27 Nov 2024
Languages
TypeScript (81.64%)
JavaScript (9.2%)
HTML (8.6%)
Shell (0.46%)
CSS (0.1%)
Total Downloads
Cumulative downloads
Total Downloads
125,383,625
Last day
-2.5%
52,401
Compared to previous day
Last week
2.9%
295,670
Compared to previous week
Last month
7.9%
1,201,254
Compared to previous month
Last year
-28.6%
14,519,570
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Dependencies
1
Dev Dependencies
3
SECURITY WARNING: both
graphql-playground-html
and all four (4) of it's middleware dependents untilgraphql-playground-html@1.6.22
were subject to an XSS Reflection attack vulnerability only to unsanitized user input strings to the functions therein. This was resolved ingraphql-playground-html@^1.6.22
. More Information CVE-2020-4038
Future of this repository: See this issue for details.
GraphQL IDE for better development workflows (GraphQL Subscriptions, interactive docs & collaboration).
Installation
1$ brew install --cask graphql-playground
Features
- ✨ Context-aware autocompletion & error highlighting
- 📚 Interactive, multi-column docs (keyboard support)
- ⚡️ Supports real-time GraphQL Subscriptions
- ⚙ GraphQL Config support with multiple Projects & Endpoints
- 🚥 Apollo Tracing support
Security Details
NOTE: only unsanitized user input to the functions in these packages is vulnerable to the recently reported XSS Reflection attack.
Impact
Impacted are any and all unsanitized user-defined input to: -
renderPlaygroundPage()
-koaPlayground()
-expressPlayground()
-koaPlayground()
-`lambdaPlayground()
If you used static values, such as
graphql-playground-electron
does in it's webpack config, as well as the most common middleware implementations out there, they were not vulnerable to the attack.
The only reason this vulnerability exists is because we are using template strings in renderPlaygroundPage()
with potentially unsanitized user defined variables. This allows an attacker to inject html and javascript into the page.
Common examples may be user-defined path parameters, query string, unsanitized UI provided values in database, etc., that are used to build template strings or passed directly to a renderPlaygroundPage()
or the matching middleware function equivalent listed above.
Impacted Packages
All versions of these packages are impacted until the ones specified below, which are now safe for user defined input:
graphql-playground-html
: ☔ safe @1.6.22
graphql-playground-express
☔ safe @1.7.16
graphql-playground-koa
☔ safe @1.6.15
graphql-playground-hapi
☔ safe @1.6.13
graphql-playground-lambda
☔ safe @1.7.17
graphql-playground-electron
has always been ☔ safe from XSS attacks! This is because configuration is statically defined it's webpack configgraphql-playground-react
is safe because it does not userenderPlaygroundPage()
anywhere, and thus is not susceptible to template string XSS reflection attacks.
More Information
See the security docs for more details on how your implementation might be impacted by this vulnerability. It contains safe examples, unsafe examples, workarounds, and more details.
We've also provided 'an example of the xss using the express middleware
FAQ
How is this different from GraphiQL?
GraphQL Playground uses components of GraphiQL under the hood but is meant as a more powerful GraphQL IDE enabling better (local) development workflows. Compared to GraphiQL, the GraphQL Playground ships with the following additional features:
- Interactive, multi-column schema documentation
- Automatic schema reloading
- Support for GraphQL Subscriptions
- Query history
- Configuration of HTTP headers
- Tabs
See the following question for more additonal features.
What's the difference between the desktop app and the web version?
The desktop app is the same as the web version but includes these additional features:
- Partial support for graphql-config enabling features like multi-environment setups (no support for sending HTTP headers).
- Double click on
*.graphql
files.
How does GraphQL Bin work?
You can easily share your Playgrounds with others by clicking on the "Share" button and sharing the generated link. You can think about GraphQL Bin like Pastebin for your GraphQL queries including the context (endpoint, HTTP headers, open tabs etc).
You can also find the announcement blog post here.
Settings
In the top right corner of the Playground window you can click on the settings icon. These are the settings currently available:
1{ 2 'editor.cursorShape': 'line', // possible values: 'line', 'block', 'underline' 3 'editor.fontFamily': `'Source Code Pro', 'Consolas', 'Inconsolata', 'Droid Sans Mono', 'Monaco', monospace`, 4 'editor.fontSize': 14, 5 'editor.reuseHeaders': true, // new tab reuses headers from last tab 6 'editor.theme': 'dark', // possible values: 'dark', 'light' 7 'general.betaUpdates': false, 8 'prettier.printWidth': 80, 9 'prettier.tabWidth': 2, 10 'prettier.useTabs': false, 11 'request.credentials': 'omit', // possible values: 'omit', 'include', 'same-origin' 12 'schema.polling.enable': true, // enables automatic schema polling 13 'schema.polling.endpointFilter': '*localhost*', // endpoint filter for schema polling 14 'schema.polling.interval': 2000, // schema polling interval in ms 15 'schema.disableComments': boolean, 16 'tracing.hideTracingResponse': true, 17 'tracing.tracingSupported': true, // set false to remove x-apollo-tracing header from Schema fetch requests 18}
Usage
Properties
The React component <Playground />
and all middlewares expose the following options:
props
(Middlewares & React Component)endpoint
string
- the GraphQL endpoint url.subscriptionEndpoint
string
- the GraphQL subscriptions endpoint url.workspaceName
string
- in case you provide a GraphQL Config, you can name your workspace hereconfig
string
- the JSON of a GraphQL Config. See an example heresettings
ISettings
- Editor settings in json format as described here
1interface ISettings { 2 'editor.cursorShape': 'line' | 'block' | 'underline' 3 'editor.fontFamily': string 4 'editor.fontSize': number 5 'editor.reuseHeaders': boolean 6 'editor.theme': 'dark' | 'light' 7 'general.betaUpdates': boolean 8 'prettier.printWidth': number 9 'prettier.tabWidth': number 10 'prettier.useTabs': boolean 11 'request.credentials': 'omit' | 'include' | 'same-origin' 12 'request.globalHeaders': { [key: string]: string } 13 'schema.polling.enable': boolean 14 'schema.polling.endpointFilter': string 15 'schema.polling.interval': number 16 'schema.disableComments': boolean 17 'tracing.hideTracingResponse': boolean 18 'tracing.tracingSupported': boolean 19}
schema
IntrospectionResult
- The result of an introspection query (an object of this form:{__schema: {...}}
) The playground automatically fetches the schema from the endpoint. This is only needed when you want to override the schema.tabs
Tab[]
- An array of tabs to inject. Note: When using this feature, tabs will be resetted each time the page is reloaded
1interface Tab { 2 endpoint: string 3 query: string 4 name?: string 5 variables?: string 6 responses?: string[] 7 headers?: { [key: string]: string } 8}
In addition to this, the React app provides some more properties:
props
(React Component)createApolloLink
[(session: Session, subscriptionEndpoint?: string) => ApolloLink
] - this is the equivalent to thefetcher
of GraphiQL. For each query that is being executed, this function will be called
createApolloLink
is only available in the React Component and not the middlewares, because the content must be serializable as it is being printed into a HTML template.
As HTML Page
If you simply want to render the Playground HTML on your own, for example when implementing a GraphQL Server, there are 2 options for you:
- The bare minimum HTML needed to render the Playground
- The Playground HTML with full loading animation
Note: In case you do not want to serve assets from a CDN (like jsDelivr) and instead use a local copy, you will need to install graphql-playground-react
from npm, and then replace all instances of //cdn.jsdelivr.net/npm
with ./node_modules
. An example can be found here
As React Component
Install
1yarn add graphql-playground-react
Use
GraphQL Playground provides a React component responsible for rendering the UI and Session management.
There are 3 dependencies needed in order to run the graphql-playground-react
React component.
- Open Sans and Source Code Pro fonts
- Rendering the
<Playground />
component
The GraphQL Playground requires React 16.
Including Fonts (1.
)
1<link 2 href="https://fonts.googleapis.com/css?family=Open+Sans:300,400,600,700|Source+Code+Pro:400,700" 3 rel="stylesheet" 4/>
Including stylesheet and the component (2., 3.
)
1import React from 'react' 2import ReactDOM from 'react-dom' 3import { Provider } from 'react-redux' 4import { Playground, store } from 'graphql-playground-react' 5 6ReactDOM.render( 7 <Provider store={store}> 8 <Playground endpoint='https://api.graph.cool/simple/v1/swapi' /> 9 </Provider>, 10 document.body, 11)
As Server Middleware
Install
1# Pick the one that matches your server framework 2yarn add graphql-playground-middleware-express # for Express or Connect 3yarn add graphql-playground-middleware-hapi 4yarn add graphql-playground-middleware-koa 5yarn add graphql-playground-middleware-lambda
Usage with example
We have a full example for each of the frameworks below:
-
Express: See packages/graphql-playground-middleware-express/examples/basic
-
Lambda (as serverless handler): See serverless-graphql-apollo or a quick example below.
As serverless handler
Install
1yarn add graphql-playground-middleware-lambda
Usage
handler.js
1import lambdaPlayground from 'graphql-playground-middleware-lambda' 2// or using require() 3// const lambdaPlayground = require('graphql-playground-middleware-lambda').default 4 5exports.graphqlHandler = function graphqlHandler(event, context, callback) { 6 function callbackFilter(error, output) { 7 // eslint-disable-next-line no-param-reassign 8 output.headers['Access-Control-Allow-Origin'] = '*' 9 callback(error, output) 10 } 11 12 const handler = graphqlLambda({ schema: myGraphQLSchema }) 13 return handler(event, context, callbackFilter) 14} 15 16exports.playgroundHandler = lambdaPlayground({ 17 endpoint: '/dev/graphql', 18})
serverless.yml
1functions: 2 graphql: 3 handler: handler.graphqlHandler 4 events: 5 - http: 6 path: graphql 7 method: post 8 cors: true 9 playground: 10 handler: handler.playgroundHandler 11 events: 12 - http: 13 path: playground 14 method: get 15 cors: true
Security Issue
There is an XSS Reflection Vulnerability when using these middlewares with unsanitized user input before
Development
1$ cd packages/graphql-playground-react 2$ yarn 3$ yarn start
Open localhost:3000/localDev.html?endpoint=https://api.graph.cool/simple/v1/swapi for local development!
Contributing to this project
This repository is managed by EasyCLA. Project participants must sign the free (GraphQL Specification Membership agreement before making a contribution. You only need to do this one time, and it can be signed by individual contributors or their employers.
To initiate the signature process please open a PR against this repo. The EasyCLA bot will block the merge if we still need a membership agreement from you.
You can find detailed information here. If you have issues, please email operations@graphql.org.
If your company benefits from GraphQL and you would like to provide essential financial support for the systems and people that power our community, please also consider membership in the GraphQL Foundation.
Custom Theme
From graphql-playground-react@1.7.0
on you can provide a codeTheme
property to the React Component to customize your color theme.
These are the available options:
1export interface EditorColours { 2 property: string 3 comment: string 4 punctuation: string 5 keyword: string 6 def: string 7 qualifier: string 8 attribute: string 9 number: string 10 string: string 11 builtin: string 12 string2: string 13 variable: string 14 meta: string 15 atom: string 16 ws: string 17 selection: string 18 cursorColor: string 19 editorBackground: string 20 resultBackground: string 21 leftDrawerBackground: string 22 rightDrawerBackground: string 23}
Versions
This is repository is a "mono repo" and contains multiple packages using Yarn workspaces. Please be aware that versions are not synchronised between packages. The versions of the release page refer to the electron app.
Packages
In the folder packages
you'll find the following packages:
graphql-playground-electron
: Cross-platform electron app which usesgraphql-playground-react
graphql-playground-html
: Simple HTML page rendering a version ofgraphql-playground-react
hosted on JSDelivergraphql-playground-middleware-express
: Express middleware usinggraphql-playground-html
graphql-playground-middleware-hapi
: Hapi middleware usinggraphql-playground-html
graphql-playground-middleware-koa
: Koa middleware usinggraphql-playground-html
graphql-playground-middleware-lambda
: AWS Lambda middleware usinggraphql-playground-html
graphql-playground-react
: Core of GraphQL Playground built with ReactJS
Help & Community
Join our Discord Server if you run into issues or have questions. We love talking to you!
Stable Version
The latest stable version of the package.
Stable Version
1.6.30
HIGH
1
7.4/10
Summary
Reflected XSS in GraphQL Playground
Affected Versions
< 1.6.22
Patched Versions
1.6.22
Reason
no binaries found in the repo
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
security policy file detected
Details
- Info: security policy file detected: SECURITY.md:1
- Warn: no linked content found
- Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1
- Info: Found text in security policy: SECURITY.md:1
Reason
Found 14/30 approved changesets -- score normalized to 4
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
Project has not signed or included provenance with any releases.
Details
- Warn: release artifact v1.8.10 not signed: https://api.github.com/repos/graphql/graphql-playground/releases/15733883
- Warn: release artifact v1.8.9 not signed: https://api.github.com/repos/graphql/graphql-playground/releases/15313996
- Warn: release artifact v1.8.8 not signed: https://api.github.com/repos/graphql/graphql-playground/releases/15258824
- Warn: release artifact v1.8.7 not signed: https://api.github.com/repos/graphql/graphql-playground/releases/15211849
- Warn: release artifact v1.8.6 not signed: https://api.github.com/repos/graphql/graphql-playground/releases/15203418
- Warn: release artifact v1.8.10 does not have provenance: https://api.github.com/repos/graphql/graphql-playground/releases/15733883
- Warn: release artifact v1.8.9 does not have provenance: https://api.github.com/repos/graphql/graphql-playground/releases/15313996
- Warn: release artifact v1.8.8 does not have provenance: https://api.github.com/repos/graphql/graphql-playground/releases/15258824
- Warn: release artifact v1.8.7 does not have provenance: https://api.github.com/repos/graphql/graphql-playground/releases/15211849
- Warn: release artifact v1.8.6 does not have provenance: https://api.github.com/repos/graphql/graphql-playground/releases/15203418
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
- Warn: 0 commits out of 17 are checked with a SAST tool
Reason
173 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-67hx-6x53-jw92
- Warn: Project is vulnerable to: GHSA-v88g-cgmw-v5xw
- Warn: Project is vulnerable to: GHSA-whgm-jr23-g3j9
- Warn: Project is vulnerable to: GHSA-93q8-gq69-wqmw
- Warn: Project is vulnerable to: GHSA-r4pf-3v7r-hh55
- Warn: Project is vulnerable to: GHSA-fwr7-v2mv-hh25
- Warn: Project is vulnerable to: GHSA-rrc9-gqf8-8rwg
- Warn: Project is vulnerable to: GHSA-4w2v-q235-vp99
- Warn: Project is vulnerable to: GHSA-cph5-m8f7-6c5x
- Warn: Project is vulnerable to: GHSA-wf5p-g6vw-rhxx
- Warn: Project is vulnerable to: GHSA-pp7h-53gx-mx7r
- Warn: Project is vulnerable to: GHSA-qwcr-r2fm-qrc7
- Warn: Project is vulnerable to: GHSA-cwfw-4gq5-mrqx
- Warn: Project is vulnerable to: GHSA-g95f-p29q-9xw4
- Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg
- Warn: Project is vulnerable to: GHSA-x9w5-v3q2-3rhw
- Warn: Project is vulnerable to: GHSA-w8qv-6jwh-64r5
- Warn: Project is vulnerable to: GHSA-4gw3-8f77-f72c
- Warn: Project is vulnerable to: GHSA-257v-vj4p-3w2h
- Warn: Project is vulnerable to: GHSA-pxg6-pf52-xh8x
- Warn: Project is vulnerable to: GHSA-7gc6-qh9x-w6h8
- Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275
- Warn: Project is vulnerable to: GHSA-gxpj-cx7g-858c
- Warn: Project is vulnerable to: GHSA-w573-4hg7-7wgq
- Warn: Project is vulnerable to: GHSA-3wcq-x3mq-6r9p
- Warn: Project is vulnerable to: GHSA-ff7x-qrg7-qggm
- Warn: Project is vulnerable to: GHSA-phwq-j96m-2c2q
- Warn: Project is vulnerable to: GHSA-ghr5-ch3p-vcr6
- Warn: Project is vulnerable to: GHSA-6vrv-94jv-crrg
- Warn: Project is vulnerable to: GHSA-f9mq-jph6-9mhm
- Warn: Project is vulnerable to: GHSA-h9jc-284h-533g
- Warn: Project is vulnerable to: GHSA-m93v-9qjc-3g79
- Warn: Project is vulnerable to: GHSA-hvf8-h2qh-37m9
- Warn: Project is vulnerable to: GHSA-mpjm-v997-c4h4
- Warn: Project is vulnerable to: GHSA-3p22-ghq8-v749
- Warn: Project is vulnerable to: GHSA-77xc-hjv8-ww97
- Warn: Project is vulnerable to: GHSA-mq8j-3h7h-p8g7
- Warn: Project is vulnerable to: GHSA-p2jh-44qj-pf2v
- Warn: Project is vulnerable to: GHSA-p7v2-p9m8-qqg7
- Warn: Project is vulnerable to: GHSA-7x97-j373-85x5
- Warn: Project is vulnerable to: GHSA-7m48-wc93-9g85
- Warn: Project is vulnerable to: GHSA-qqvq-6xgj-jw8g
- Warn: Project is vulnerable to: GHSA-9jxc-qjr9-vjxq
- Warn: Project is vulnerable to: GHSA-vh7m-p724-62c2
- Warn: Project is vulnerable to: GHSA-r9p9-mrjm-926w
- Warn: Project is vulnerable to: GHSA-434g-2637-qmqr
- Warn: Project is vulnerable to: GHSA-49q7-c7j4-3p7m
- Warn: Project is vulnerable to: GHSA-977x-g7h5-7qgw
- Warn: Project is vulnerable to: GHSA-f7q4-pwc6-w24p
- Warn: Project is vulnerable to: GHSA-fc9h-whq2-v747
- Warn: Project is vulnerable to: GHSA-6h5x-7c5m-7cr7
- Warn: Project is vulnerable to: GHSA-rv95-896h-c2vc
- Warn: Project is vulnerable to: GHSA-qw6h-vgh9-j6wx
- Warn: Project is vulnerable to: GHSA-74fj-2j2h-c42q
- Warn: Project is vulnerable to: GHSA-pw2r-vq6v-hr8c
- Warn: Project is vulnerable to: GHSA-jchw-25xp-jwwc
- Warn: Project is vulnerable to: GHSA-cxjh-pqwp-8mfp
- Warn: Project is vulnerable to: GHSA-ww39-953v-wcq6
- Warn: Project is vulnerable to: GHSA-pfrx-2q88-qq97
- Warn: Project is vulnerable to: GHSA-x4r7-m2q9-69c8
- Warn: Project is vulnerable to: GHSA-4852-vrh7-28rf
- Warn: Project is vulnerable to: GHSA-765h-qjxv-5f44
- Warn: Project is vulnerable to: GHSA-f2jv-r9rf-7988
- Warn: Project is vulnerable to: GHSA-c429-5p7v-vgjp
- Warn: Project is vulnerable to: GHSA-43f8-2h32-f4cj
- Warn: Project is vulnerable to: GHSA-pfq8-rq6v-vf5m
- Warn: Project is vulnerable to: GHSA-rc47-6667-2j5j
- Warn: Project is vulnerable to: GHSA-6x33-pw7p-hmpq
- Warn: Project is vulnerable to: GHSA-c7qv-q95q-8v27
- Warn: Project is vulnerable to: GHSA-qqgx-2p2h-9c37
- Warn: Project is vulnerable to: GHSA-78xj-cgh5-2h22
- Warn: Project is vulnerable to: GHSA-2p57-rm9w-gvfp
- Warn: Project is vulnerable to: GHSA-7r28-3m3f-r2pr
- Warn: Project is vulnerable to: GHSA-r8j5-h5cx-65gg
- Warn: Project is vulnerable to: GHSA-2pr6-76vf-7546
- Warn: Project is vulnerable to: GHSA-8j8c-7jfh-h6hx
- Warn: Project is vulnerable to: GHSA-896r-f27r-55mw
- Warn: Project is vulnerable to: GHSA-9c47-m6qq-7p4h
- Warn: Project is vulnerable to: GHSA-8cf7-32gw-wr33
- Warn: Project is vulnerable to: GHSA-hjrf-2m68-5959
- Warn: Project is vulnerable to: GHSA-qwph-4952-7xr6
- Warn: Project is vulnerable to: GHSA-jg8v-48h5-wgxg
- Warn: Project is vulnerable to: GHSA-36fh-84j7-cv5h
- Warn: Project is vulnerable to: GHSA-76p3-8jx3-jpfq
- Warn: Project is vulnerable to: GHSA-3rfm-jhwj-7488
- Warn: Project is vulnerable to: GHSA-hhq3-ff78-jv3g
- Warn: Project is vulnerable to: GHSA-p6mc-m468-83gw
- Warn: Project is vulnerable to: GHSA-29mw-wpgm-hmr9
- Warn: Project is vulnerable to: GHSA-35jh-r3h4-6jhm
- Warn: Project is vulnerable to: GHSA-6vfc-qv3f-vr6c
- Warn: Project is vulnerable to: GHSA-4xcv-9jjx-gfj3
- Warn: Project is vulnerable to: GHSA-7wpw-2hjm-89gp
- Warn: Project is vulnerable to: GHSA-952p-6rrq-rcjv
- Warn: Project is vulnerable to: GHSA-f8q6-p94x-37v3
- Warn: Project is vulnerable to: GHSA-vh95-rmgr-6w4m / GHSA-xvch-5gv4-984h
- Warn: Project is vulnerable to: GHSA-8hfj-j24r-96c4
- Warn: Project is vulnerable to: GHSA-wc69-rhjr-hc9g
- Warn: Project is vulnerable to: GHSA-r683-j2x4-v87g
- Warn: Project is vulnerable to: GHSA-w7rc-rwvf-8q5r
- Warn: Project is vulnerable to: GHSA-92xj-mqp7-vmcj
- Warn: Project is vulnerable to: GHSA-wxgw-qj99-44c2
- Warn: Project is vulnerable to: GHSA-5rrq-pxf6-6jx5
- Warn: Project is vulnerable to: GHSA-8fr3-hfg3-gpgp
- Warn: Project is vulnerable to: GHSA-gf8q-jrpm-jvxq
- Warn: Project is vulnerable to: GHSA-2r2c-g63r-vccr
- Warn: Project is vulnerable to: GHSA-cfm4-qjh2-4765
- Warn: Project is vulnerable to: GHSA-x4jg-mjrx-434g
- Warn: Project is vulnerable to: GHSA-5fw9-fq32-wv5p
- Warn: Project is vulnerable to: GHSA-px4h-xg32-q955
- Warn: Project is vulnerable to: GHSA-rp65-9cf3-cjxr
- Warn: Project is vulnerable to: GHSA-28xh-wpgr-7fm8
- Warn: Project is vulnerable to: GHSA-3j8f-xvm3-ffx4
- Warn: Project is vulnerable to: GHSA-4p35-cfcx-8653
- Warn: Project is vulnerable to: GHSA-7f3x-x4pr-wqhj
- Warn: Project is vulnerable to: GHSA-jpp7-7chh-cf67
- Warn: Project is vulnerable to: GHSA-q6wq-5p59-983w
- Warn: Project is vulnerable to: GHSA-j9fq-vwqv-2fm2
- Warn: Project is vulnerable to: GHSA-pqw5-jmp5-px4v
- Warn: Project is vulnerable to: GHSA-hj48-42vr-x3v9
- Warn: Project is vulnerable to: GHSA-9wv6-86v2-598j
- Warn: Project is vulnerable to: GHSA-566m-qj78-rww5
- Warn: Project is vulnerable to: GHSA-7fh5-64p2-3v2j
- Warn: Project is vulnerable to: GHSA-hwj9-h5mp-3pm3
- Warn: Project is vulnerable to: GHSA-hrpp-h998-j3pp
- Warn: Project is vulnerable to: GHSA-5q6m-3h65-w53x
- Warn: Project is vulnerable to: GHSA-p8p7-x288-28g6
- Warn: Project is vulnerable to: GHSA-c2qf-rxjj-qqgw
- Warn: Project is vulnerable to: GHSA-m6fv-jmcg-4jfg
- Warn: Project is vulnerable to: GHSA-hxcc-f52p-wc94
- Warn: Project is vulnerable to: GHSA-cm22-4g7w-348p
- Warn: Project is vulnerable to: GHSA-g4rg-993r-mgx7
- Warn: Project is vulnerable to: GHSA-wpg7-2c88-r8xv
- Warn: Project is vulnerable to: GHSA-vx3p-948g-6vhq
- Warn: Project is vulnerable to: GHSA-3jfq-g458-7qm9
- Warn: Project is vulnerable to: GHSA-r628-mhmh-qjhw
- Warn: Project is vulnerable to: GHSA-9r2w-394v-53qc
- Warn: Project is vulnerable to: GHSA-5955-9wpr-37jh
- Warn: Project is vulnerable to: GHSA-qq89-hq3f-393p
- Warn: Project is vulnerable to: GHSA-f5x3-32g6-xq36
- Warn: Project is vulnerable to: GHSA-4wf5-vphf-c2xc
- Warn: Project is vulnerable to: GHSA-29xr-v42j-r956
- Warn: Project is vulnerable to: GHSA-jgrx-mgxx-jf9v
- Warn: Project is vulnerable to: GHSA-72xf-g2v4-qvf3
- Warn: Project is vulnerable to: GHSA-7p7h-4mm5-852v
- Warn: Project is vulnerable to: GHSA-38fc-wpqx-33j7
- Warn: Project is vulnerable to: GHSA-662x-fhqg-9p8v
- Warn: Project is vulnerable to: GHSA-394c-5j6w-4xmx
- Warn: Project is vulnerable to: GHSA-78cj-fxph-m83p
- Warn: Project is vulnerable to: GHSA-fhg7-m89q-25r3
- Warn: Project is vulnerable to: GHSA-3329-pjwv-fjpg
- Warn: Project is vulnerable to: GHSA-p6j9-7xhc-rhwp
- Warn: Project is vulnerable to: GHSA-89gv-h8wf-cg8r
- Warn: Project is vulnerable to: GHSA-gcv8-gh4r-25x6
- Warn: Project is vulnerable to: GHSA-gmv4-r438-p67f
- Warn: Project is vulnerable to: GHSA-8h2f-7jc4-7m3m
- Warn: Project is vulnerable to: GHSA-3vjf-82ff-p4r3
- Warn: Project is vulnerable to: GHSA-g694-m8vq-gv9h
- Warn: Project is vulnerable to: GHSA-9m6j-fcg5-2442
- Warn: Project is vulnerable to: GHSA-hh27-ffr2-f2jc
- Warn: Project is vulnerable to: GHSA-rqff-837h-mm52
- Warn: Project is vulnerable to: GHSA-8v38-pw62-9cw2
- Warn: Project is vulnerable to: GHSA-hgjh-723h-mx2j
- Warn: Project is vulnerable to: GHSA-jf5r-8hm2-f872
- Warn: Project is vulnerable to: GHSA-qgmg-gppg-76g5
- Warn: Project is vulnerable to: GHSA-wr3j-pwj9-hqq6
- Warn: Project is vulnerable to: GHSA-cf66-xwfp-gvc4
- Warn: Project is vulnerable to: GHSA-g78m-2chm-r7qv
- Warn: Project is vulnerable to: GHSA-j8xg-fqg3-53r7
- Warn: Project is vulnerable to: GHSA-6fc8-4gx4-v693
- Warn: Project is vulnerable to: GHSA-3h5v-q93c-6h6q
- Warn: Project is vulnerable to: GHSA-776f-qx25-q3cc
- Warn: Project is vulnerable to: GHSA-c4w7-xm78-47vh
- Warn: Project is vulnerable to: GHSA-p9pc-299p-vxgp
Score
2.6
/10
Last Scanned on 2024-11-18
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn MoreOther packages similar to graphql-playground-html
@apollographql/graphql-playground-html
GraphQL IDE for better development workflows (GraphQL Subscriptions, interactive docs & collaboration).
graphql-playground-middleware-express
GraphQL IDE for better development workflows (GraphQL Subscriptions, interactive docs & collaboration).
graphql-playground-middleware-koa
GraphQL IDE for better development workflows (GraphQL Subscriptions, interactive docs & collaboration).
parse5
HTML parser and serializer.