Gathering detailed insights and metrics for verdaccio-htpasswd
Gathering detailed insights and metrics for verdaccio-htpasswd
Gathering detailed insights and metrics for verdaccio-htpasswd
Gathering detailed insights and metrics for verdaccio-htpasswd
🏰 Core dependencies and plugins for verdaccio 6.x branch ⚠️ DEPRECATED
npm install verdaccio-htpasswd
Typescript
Module System
Min. Node Version
Node Version
NPM Version
96.8
Supply Chain
94.9
Quality
95.7
Maintenance
100
Vulnerability
99.6
License
@verdaccio/local-storage@10.5.0
Updated on Jun 29, 2025
verdaccio-memory@10.4.0
Updated on Jun 29, 2025
@verdaccio/active-directory@10.3.0
Updated on Jun 29, 2025
@verdaccio/local-storage-legacy@11.1.0
Updated on Jun 29, 2025
verdaccio-auth-memory@10.3.0
Updated on Jun 29, 2025
@verdaccio/local-storage@10.4.0
Updated on Jun 29, 2025
TypeScript (97.7%)
JavaScript (2.13%)
Dockerfile (0.17%)
Total Downloads
30,347,783
Last Day
23,211
Last Week
299,874
Last Month
1,306,909
Last Year
11,687,170
MIT License
84 Stars
1,783 Commits
62 Forks
7 Watchers
12 Branches
84 Contributors
Updated on Jun 29, 2025
Minified
Minified + Gzipped
Latest Version
10.5.5
Package Id
verdaccio-htpasswd@10.5.5
Unpacked Size
64.46 kB
Size
17.68 kB
File Count
15
NPM Version
8.19.4
Node Version
16.20.0
Published on
Apr 21, 2023
Cumulative downloads
Total Downloads
Last Day
17.3%
23,211
Compared to previous day
Last Week
-6.9%
299,874
Compared to previous week
Last Month
-0.4%
1,306,909
Compared to previous month
Last Year
66%
11,687,170
Compared to previous year
3
verdaccio-htpasswd
is a default authentication plugin for the Verdaccio.
Plugin only valid for verdaccio v5.x
As simple as running:
$ npm install -g verdaccio-htpasswd
auth:
htpasswd:
file: ./htpasswd
# Maximum amount of users allowed to register, defaults to "+infinity".
# You can set this to -1 to disable registration.
#max_users: 1000
# Hash algorithm, possible options are: "bcrypt", "md5", "sha1", "crypt".
# Default algorithm is crypt.
#algorithm: bcrypt
# Rounds number for "bcrypt", will be ignored for other algorithms.
# Setting this value higher will result in password verification taking longer.
#rounds: 10
# Log a warning if the password takes more then this duration in milliseconds to verify.
#slow_verify_ms: 200
It is important to note that when using the default bcrypt
algorithm and setting
the rounds
configuration value to a higher number then the default of 10
, that
verification of a user password can cause significantly increased CPU usage and
additional latency in processing requests.
If your Verdaccio instance handles a large number of authenticated requests using
username and password for authentication, the rounds
configuration value may need
to be decreased to prevent excessive CPU usage and request latency.
Also note that setting the rounds
configuration value to a value that is too small
increases the risk of successful brute force attack. Auth0 has a
blog article
that provides an overview of how bcrypt
hashing works and some best practices.
To log in using NPM, run:
npm adduser --registry https://your.registry.local
If you wish to handle access control using htpasswd file, you can generate username/password combination form here and add it to htpasswd file.
The htpasswd file contains rows corresponding to a pair of username and password
separated with a colon character. The password is encrypted using the UNIX system's
crypt
method and may use MD5 or SHA1.
No vulnerabilities found.
Reason
no dangerous workflow patterns detected
Reason
12 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Reason
no binaries found in the repo
Reason
license file detected
Details
Reason
dependency not pinned by hash detected -- score normalized to 3
Details
Reason
Found 2/12 approved changesets -- score normalized to 1
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
project is not fuzzed
Details
Reason
security policy file not detected
Details
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
Reason
22 existing vulnerabilities detected
Details
Score
Last Scanned on 2025-06-23
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More