npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

alkaati

v1.0.1

Published

Bun security scanner for everyone

Readme

Bun Security Scanner Template

A template for creating a security scanner for Bun's package installation process. Security scanners scan packages against your threat intelligence feeds and control whether installations proceed based on detected threats.

📚 Full documentation

How It Works

When packages are installed via Bun, your security scanner:

  1. Receives package information (name, version)
  2. Queries your threat intelligence API
  3. Validates the response data
  4. Categorizes threats by severity
  5. Returns advisories to control installation (empty array if safe)

Advisory Levels

  • Fatal (level: 'fatal'): Installation stops immediately
    • Examples: malware, token stealers, backdoors, critical vulnerabilities
  • Warning (level: 'warn'): User prompted for confirmation
    • In TTY: User can choose to continue or cancel
    • Non-TTY: Installation automatically cancelled
    • Examples: protestware, adware, deprecated packages

All advisories are always displayed to the user regardless of level.

Error Handling

If your scan function throws an error, it will be gracefully handled by Bun, but the installation process will be cancelled as a defensive precaution.

Validation

When fetching threat feeds over the network, use schema validation
(e.g., Zod) to ensure data integrity. Invalid responses should fail immediately rather than silently returning empty advisories.

import {z} from 'zod';

const ThreatFeedItemSchema = z.object({
	package: z.string(),
	version: z.string(),
	url: z.string().nullable(),
	description: z.string().nullable(),
	categories: z.array(z.enum(['backdoor', 'botnet' /* ... */])),
});

Useful Bun APIs

Bun provides several built-in APIs that are particularly useful for security scanner:

  • Security scanner API Reference: Complete API documentation for security scanners

  • Bun.semver.satisfies(): Essential for checking if package versions match vulnerability ranges. No external dependencies needed.

    if (Bun.semver.satisfies(version, '>=1.0.0 <1.2.5')) {
    	// Version is vulnerable
    }
  • Bun.hash: Fast hashing for package integrity checks

  • Bun.file: Efficient file I/O, could be used for reading local threat databases

Testing

This template includes tests for a known malicious package version. Customize the test file as needed.

bun test

Publishing Your Provider

Publish your security scanner to npm:

bun publish

Users can now install your provider and add it to their bunfig.toml configuration.

To test locally before publishing, use bun link:

# In your provider directory
bun link

# In your test project
bun link @acme/bun # this is the name in package.json of your provider

Contributing

This is a template repository. Fork it and customize for your organization's security requirements.

Support

For docs and questions, see the Bun documentation or Join our Discord.

For template issues, please open an issue in this repository.