nopp
Object protector
Protects against Prototype Pollution vulnerabilities in JavaScript objects by freezing specific built-in objects.
Tiny helper to protect against Prototype Pollution vulnerabilities in your application regardless if they introduced in your own code or in 3rd-party code
27 stars
7 watching
5 forks
Language: JavaScript
last commit: over 2 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| Detects and prevents supply chain security risks in dependency management. | 43 |
| An analysis of a vulnerability in JavaScript where an attacker can manipulate the prototype of base objects to inject malicious values | 515 |
| A Java tool that protects software by making its underlying code difficult to understand or reverse engineer | 380 |
| Provides an alternative JSON parser with enhanced security features to mitigate prototype pollution attacks. | 227 |
| Scans for prototype pollution vulnerabilities in server-side applications | 7 |
| Protects against injection attacks by safely escaping untrusted strings in HTML and XML markup | 637 |
| A lightweight library to prevent accidental data mutation and bugs in applications | 44 |
| A Hapi plugin that enables Content Security Policy (CSP) security features for web applications. | 52 |
| A security module for Koa applications that provides proactive protection against common security threats. | 19 |
| Provides a drop-in replacement for JSON parsing with built-in protection against prototype poisoning vulnerabilities | 172 |
| Library that provides dynamic data cleaning and filtering capabilities for PyTorch datasets and samplers | 378 |
| Detects vulnerabilities in Content Security Policies | 163 |
| An interactive workshop to teach exploitation techniques using real-world vulnerabilities in Node.js and Java applications. | 156 |
| Protects websites from malicious crawlers and bots by filtering out suspicious traffic based on user-agent information | 211 |
| A Burp extension that scans application traffic for signs of vulnerabilities and potential attack targets | 41 |