Automatically configure your app to follow OWASP security patterns and principles by using HTTP Headers and Middleware. This module works with Nuxt 3 only. Features include Security response headers (including CSP for SSG apps), Request Size & Rate Limiters, Cross Site Scripting (XSS) Validation, Cross-Origin Resource Sharing (CORS) support, Hide X-Powered-By header and remove console loggers utils, Allowed HTTP Methods, Basic Auth, CSRF. To use, install the module: npx nuxi@latest module add security. The module will register route rules and server middlewares globally for enhanced application security. Configuration can be passed in nuxt.config.ts. For all available configuration options, refer to the documentation. Development can be initiated by running yarn dev:prepare to generate type stubs and then using yarn dev to start the playground in development mode.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Detailed analysis of the event-stream incident and actions taken by npm Security.
A proof of concept for using the SSM Agent in Fargate for incident response
An enterprise cybersecurity platform that unifies endpoint, cloud, and identity security through an integrated data lake architecture with AI-powered analysis capabilities.
A multi-platform open source tool for triaging suspect systems and hunting for Indicators of Compromise (IOCs) across thousands of endpoints.
A project that uses Athena and EventBridge to investigate API activity and notify of actions for incident response and misconfiguration detection.
A framework for improving detection strategies and alert efficacy.
A collection of AWS security architectures for various security operations.
An open-source incident response case management tool that provides visualization, threat intelligence lookups, and security framework mapping in a unified workspace.
A data curation platform that automates security data collection, transformation and routing while reducing data volume and infrastructure costs.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.