A low overhead rate limiter for your routes. This plugin will add an onRequest hook to check if a client (based on their IP address) has made too many requests in the given timeWindow. Usage: Register the plugin and, if required, pass some custom options. Example: ```javascript import Fastify from 'fastify' const fastify = Fastify() await fastify.register(import('@fastify/rate-limit'), { max: 100, timeWindow: '1 minute' }) fastify.get('/', (request, reply) => { reply.send({ hello: 'world' }) }) fastify.listen({ port: 3000 }, err => { if (err) throw err console.log('Server listening at http://localhost:3000') }) ```
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
AndroBugs Framework is an Android vulnerability analysis system that scans mobile applications for security vulnerabilities, missing best practices, and dangerous shell commands.
A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.
A source code search engine for searching alphanumeric snippets, signatures, or keywords in web page HTML, JS, and CSS code.
RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.
Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.
QIRA is a competitor to strace and gdb with MIT license, supporting Ubuntu and Docker for wider compatibility.
An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.
Grafeas is an API specification for managing and auditing metadata about software resources across the software supply chain.
Bearer CLI is a static application security testing tool that scans source code across multiple programming languages to identify and prioritize OWASP Top 10 and CWE Top 25 security vulnerabilities through data flow analysis.