@envelop/generic-auth vulnerabilities

This plugin allows you to implement custom authentication flow by providing a custom user resolver based on the original HTTP request. The resolved user is injected into the GraphQL execution `context`, and you can use it in your resolvers to fetch the cu

Package versions

1454 VERSIONS IN TOTAL
versionpublisheddirect vulnerabilities
9.1.1-rc-20250305102831-1bf3c4dd22beef40cf826d0ebfece936a0b704795 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.1.1-alpha-20250305102622-feba3bdc3029415b9802b2baffd8a8c5e15cade75 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.1.1-alpha-20250305102258-0818d8be116d0d3732bfa1811b277d2e32a3a6905 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.1.1-rc-20250305102156-1111a51653cb1893e6c9d71df386f95f3b2e0f625 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.1.1-alpha-20250305102026-84e6ced64feb11e4c4601527bab60b91bd3f29d25 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.1.04 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.1.0-rc-20250304113349-2801f0901a3ce0fa48807059a892355fd3dcdb714 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.1.0-alpha-20250304113139-7741b765509b84e9479d55e56eea336644a418ea4 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.1.0-alpha-20250304112901-104f55fcc4d6144f2e931f5f9e90635691aad2e84 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.1.0-rc-20250304112711-219374a5ae578adf061fa06588b59e9b7f16fd1d4 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
9.1.0-alpha-20250304112053-4b5f935a3536cb0aa18561560f8b4003d186bd064 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
10.0.0-alpha-20250304074037-40109c632178bb84b8118137c42e86caf27474594 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
10.0.0-rc-20250304073852-e6afc71246cc740977d8a20d8292b891e7e27bb64 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
10.0.0-alpha-20250304073520-9e163b8a686669f3c53e2b7bbed5297f38572d984 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
10.0.0-alpha-20250304034758-06647caa74988685dcb6bb96ec464bc15404feb34 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
10.0.0-alpha-20250304034616-ad7d8167a0d0786a2015cf0498a73098e6be2eec4 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
10.0.0-alpha-20250303225257-84da986ea295c29c8a6bbd5f630a1cf58b2b4c853 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
10.0.0-rc-20250303225225-6404b4b6abe482b5e96fbb7754ca9dd62459e8b73 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
10.0.0-alpha-20250303193407-8f059f0328703453b1c1ab7e3f0fc59525a82b723 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
10.0.0-rc-20250303193223-2b9550e5dd4658c48fd4172bf9048be81c3b8b5d3 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Get started free