Gathering detailed insights and metrics for nodemailer
Gathering detailed insights and metrics for nodemailer
Gathering detailed insights and metrics for nodemailer
Gathering detailed insights and metrics for nodemailer
✉️ Send e-mails with Node.JS – easy as cake!
npm install nodemailer
66
Supply Chain
96.6
Quality
86.3
Maintenance
100
Vulnerability
100
License
Module System
Min. Node Version
Typescript Support
Node Version
NPM Version
16,752 Stars
1,069 Commits
1,368 Forks
217 Watching
10 Branches
141 Contributors
Updated on 27 Nov 2024
Minified
Minified + Gzipped
JavaScript (99.99%)
HTML (0.01%)
Cumulative downloads
Total Downloads
Last day
-3.9%
718,442
Compared to previous day
Last week
2.9%
4,158,225
Compared to previous week
Last month
6.6%
17,434,946
Compared to previous month
Last year
25.8%
179,574,971
Compared to previous year
Send emails from Node.js – easy as cake! 🍰✉️
See nodemailer.com for documentation and terms.
[!TIP] Check out EmailEngine – a self-hosted email gateway that allows making REST requests against IMAP and SMTP servers. EmailEngine also sends webhooks whenever something changes on the registered accounts.
Using the email accounts registered with EmailEngine, you can receive and send emails. EmailEngine supports OAuth2, delayed sends, opens and clicks tracking, bounce detection, etc. All on top of regular email accounts without an external MTA service.
Documentation for Nodemailer can be found at nodemailer.com.
You are using an older Node.js version than v6.0. Upgrade Node.js to get support for the spread operator. Nodemailer supports all Node.js versions starting from Node.js@v6.0.0.
Gmail either works well, or it does not work at all. It is probably easier to switch to an alternative service instead of fixing issues with Gmail. If Gmail does not work for you, then don't use it. Read more about it here.
Check your firewall settings. Timeout usually occurs when you try to open a connection to a firewalled port either on the server or on your machine. Some ISPs also block email ports to prevent spamming.
It's either a firewall issue, or your SMTP server blocks authentication attempts from some servers.
secure
option. This should be set to true
only for port 465. For every other port, it should be false
. Setting it to false
does not mean that Nodemailer would not use TLS. Nodemailer would still try to upgrade the connection to use TLS if the server supports it.false
to skip chain verification or upgrade your Node versionlet configOptions = {
host: "smtp.example.com",
port: 587,
tls: {
rejectUnauthorized: true,
minVersion: "TLSv1.2"
}
}
Node.js uses c-ares to resolve domain names, not the DNS library provided by the system, so if you have some custom DNS routing set up, it might be ignored. Nodemailer runs dns.resolve4() and dns.resolve6() to resolve hostname into an IP address. If both calls fail, then Nodemailer will fall back to dns.lookup(). If this does not work for you, you can hard code the IP address into the configuration like shown below. In that case, Nodemailer would not perform any DNS lookups.
let configOptions = {
host: "1.2.3.4",
port: 465,
secure: true,
tls: {
// must provide server name, otherwise TLS certificate check will fail
servername: "example.com"
}
}
Nodemailer has official support for Node.js only. For anything related to TypeScript, you need to directly contact the authors of the type definitions.
If you are having issues with Nodemailer, then the best way to find help would be Stack Overflow or revisit the docs.
Nodemailer is licensed under the MIT No Attribution license
The Nodemailer logo was designed by Sven Kristjansen.
The latest stable version of the package.
Stable Version
1
9.8/10
Summary
Command injection in nodemailer
Affected Versions
< 6.4.16
Patched Versions
6.4.16
2
5.3/10
Summary
nodemailer ReDoS when trying to send a specially crafted email
Affected Versions
<= 6.9.8
Patched Versions
6.9.9
6.3/10
Summary
Header injection in nodemailer
Affected Versions
< 6.6.1
Patched Versions
6.6.1
Reason
4 commit(s) and 11 issue activity found in the last 90 days -- score normalized to 10
Reason
no dangerous workflow patterns detected
Reason
no binaries found in the repo
Reason
packaging workflow detected
Details
Reason
license file detected
Details
Reason
1 existing vulnerabilities detected
Details
Reason
Found 6/21 approved changesets -- score normalized to 2
Reason
dependency not pinned by hash detected -- score normalized to 2
Details
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
Reason
project is not fuzzed
Details
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
Score
Last Scanned on 2024-11-18
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More