This library validates and sanitizes strings only. If you're not sure if your input is a string, coerce it using input + ''. Passing anything other than a string will result in an error. Installation and Usage Server-side usage Install the library with npm install validator No ES6 var validator = require('validator'); validator.isEmail('foo@bar.com'); //=> true ES6 import validator from 'validator'; Or, import only a subset of the library: import isEmail from 'validator/lib/isEmail'; Tree-shakeable ES imports import isEmail from 'validator/es/lib/isEmail'; Client-side usage The library can be loaded either as a standalone script, or through an AMD-compatible loader <script type="text/javascript" src="validator.min.js"></script> <script type="text/javascript"> validator.isEmail('foo@bar.com'); //=> true </script> The library can also be installed through bower $ bower install validator-js CDN <script src="https://unpkg.com/validator@latest/validator.min.js"></script> Validators Here is a list of the validators currently available. Validator Description contains(str, seed [, options]) check if the string contain
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Top 15 recommendations to protect your business from email-borne threats with Security Gateway.
Steampipe is a zero-ETL solution for getting data directly from APIs and services.
A daily updated list of the top 1 million websites in the world, ordered by referring subnets.
A visualization tool for uploading and visualizing data as graphs on-the-fly, based on AfterGlow and running on Django.
A tool to secure your shell commands history by clearing sensitive commands
A set of instructions for the Dalvik virtual machine to manipulate registers and values in Android applications.
Learn how to integrate security into Agile development teams for high performance
Domain registration and web hosting services with free features and 24/7 customer support
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.