Package Exports
- @escape.tech/graphql-armor
- @escape.tech/graphql-armor/dist/graphql-armor.cjs.js
- @escape.tech/graphql-armor/dist/graphql-armor.esm.js
This package does not declare an exports field, so the exports above have been automatically detected and optimized by JSPM instead. If any package subpath is missing, it is recommended to post an issue to the original package (@escape.tech/graphql-armor) to support the "exports" field. If that is not possible, create a JSPM override to customize the exports field for this package.
Readme
GraphQL Armor 🛡️
GraphQL Armor is a dead-simple yet highly customizable security middleware for various GraphQL server engines.

Contents
- Contents
- Supported GraphQL Engines
- Getting Started
- Getting Started with configuration
- Per plugin configuration
- Contributing
Supported GraphQL Engines
We support the following engines :
We additionally support the following engines through the Envelop plugin system :
- GraphQL-Helix
- Node.js HTTP
- GraphQL-WS
- GraphQL-SSE
- Azure Functions
- Cloudflare Workers
- Google Cloud Functions
- Lambda AWS
- type-graphql
- nexus
- express-graphql
See here for more information about Envelop compatibility.
Installation
# npm
npm install -S @escape.tech/graphql-armor
# yarn
yarn add @escape.tech/graphql-armorGetting Started
Refer to the Examples directory for specific implementation examples. (such as NestJS with Apollo Server)
Apollo Server
import { ApolloArmor } from '@escape.tech/graphql-armor';
const armor = new ApolloArmor();
const server = new ApolloServer({
typeDefs,
resolvers,
...armor.protect()
});If you already have some plugins or validation rules, proceed this way:
import { ApolloArmor } from '@escape.tech/graphql-armor';
const armor = new ApolloArmor();
const protection = armor.protect()
const server = new ApolloServer({
typeDefs,
resolvers,
...protection,
plugins: [...protection.plugins, myPlugin1, myPlugin2 ]
validationRules: [, ...protection.validationRules, myRule1, myRule2 ]
});GraphQL Yoga
import { EnvelopArmor } from '@escape.tech/graphql-armor';
const armor = new EnvelopArmor();
const protection = armor.protect()
async function main() {
const server = createServer({
schema,
plugins: [...protection.plugins],
});
await server.start();
}
main();import { EnvelopArmorPlugin } from '@escape.tech/graphql-armor';
async function main() {
const server = createServer({
schema,
plugins: [EnvelopArmorPlugin()],
});
await server.start();
}
main();Envelop
import { EnvelopArmor } from '@escape.tech/graphql-armor';
const armor = new EnvelopArmor();
const protection = armor.protect()
const getEnveloped = envelop({
plugins: [otherPlugins, ...protection.plugins],
});import { EnvelopArmorPlugin } from '@escape.tech/graphql-armor';
const getEnveloped = envelop({
plugins: [otherPlugins, EnvelopArmorPlugin()],
});Getting Started with configuration
GraphQL Armor is fully configurable in a per-plugin fashion.
View the per plugin configuration section for more information about how to configure each plugin separately.
import { ApolloArmor } from '@escape.tech/graphql-armor';
const armor = new ApolloArmor({
costLimit: {
maxCost: 1000,
}
}
});Per plugin configuration
The provided values are the default values.
This section describes how to configure each plugin individually.
- Stacktraces (Apollo Only)
- Batched queries (Apollo Only)
- Aliases Limit
- Character Limit
- Cost Limit
- Depth Limit
- Directives Limit
- Field Suggestion
- Token Limit
Stacktraces (Apollo Only)
Apollo Server 4
This plugin is for Apollo Server only, and is disabled by default.
Stacktraces are managed by the Apollo configuration parameter includeStacktraceInErrorResponses. GraphQL Armor set this default value to false too.
For overriding Apollo's default parameter, you can use the following code:
import { ApolloArmor } from '@escape.tech/graphql-armor';
const armor = new ApolloArmor();
const server = new ApolloServer({
typeDefs,
resolvers,
...armor.protect(),
includeStacktraceInErrorResponses: true,
});Apollo Server 3
In Apollo Server 3, this is enabled by default. For overriding Apollo's default parameter, you can use the following code:
import { ApolloArmor } from '@escape.tech/graphql-armor';
const armor = new ApolloArmor();
const server = new ApolloServer({
typeDefs,
resolvers,
...armor.protect(),
debug: false,
});Batched queries (Apollo Only)
Apollo Server 4
This plugin is for Apollo Server only, and is disabled by default.
Batched queries are managed by the Apollo configuration parameter allowBatchedHttpRequests. GraphQL Armor set this default value to false too.
For overriding Apollo's default parameter, you can use the following code:
import { ApolloArmor } from '@escape.tech/graphql-armor';
const armor = new ApolloArmor();
const server = new ApolloServer({
typeDefs,
resolvers,
...armor.protect(),
allowBatchedHttpRequests: true // setting the value to `true` makes DoS attacks easier by stacking expensive requests
});Apollo Server 3
In Apollo Server 3, this is enabled by default. For overriding Apollo's default parameter, you can use the following code:
import { ApolloArmor } from '@escape.tech/graphql-armor';
const armor = new ApolloArmor();
const server = new ApolloServer({
typeDefs,
resolvers,
...armor.protect(),
allowBatchedHttpRequests: false // setting the value to `false` is recommended to prevent stacking expensive requests
});Character Limit
This plugin is disabled by default.
It enforces a character limit on your GraphQL queries.
The limit is not applied to the whole HTTP body - multipart form data/file upload will still work.
For configuration details, refer to this README.
```typescript { characterLimit: { enabled: true, maxLength: 15000, } }
### Cost Limit
This plugin is enabled by default.
It analyzes incoming GraphQL queries and applies a cost analysis algorithm to prevent resource overload by blocking too expensive requests (DoS attack attempts).
The cost computation is quite simple (and naive) at the moment but there are plans to make it evolve toward a extensive plugin with many features.
Configuration
```typescript
{
costLimit: {
// enabled: true,
maxCost: 5000, // maximum cost of a request before it is rejected
objectCost: 2, // cost of retrieving an object
scalarCost: 1, // cost of retrieving a scalar
depthCostFactor: 1.5, // multiplicative cost of depth
ignoreIntrospection: true, // by default, introspection queries are ignored.
onAccept: [], // Callbacks that are ran whenever a Query is accepted
onReject: [], // Callbacks that are ran whenever a Query is rejected
propagateOnRejection: true, // When rejected, do you want to throw the error or report to the context?
}
}Field Suggestion
This plugin is enabled by default.
It will prevent suggesting fields in case of an erroneous request. Suggestions can lead to the leak of your schema even with disabled introspection, which can be very detrimental in case of a private API. One could use GraphDNA to recover an API schema even with disabled introspection, as long as field suggestions are enabled.
Example of such a suggestion:
Cannot query field "sta" on type "Media". Did you mean "stats", "staff", or "status"?
{
blockFieldSuggestion: {
// enabled: true,
}
}Aliases Limit
This plugin is enabled by default.
Limit the number of aliases in a document.
{
maxAliases: {
// enabled: true,
n: 15,
onAccept: [], // Callbacks that are ran whenever a Query is accepted
onReject: [], // Callbacks that are ran whenever a Query is rejected
propagateOnRejection: true, // When rejected, do you want to throw the error or report to the context?
}
}Directives Limit
This plugin is enabled by default.
Limit the number of directives in a document.
{
maxDirectives: {
// enabled: true,
n: 50,
onAccept: [], // Callbacks that are ran whenever a Query is accepted
onReject: [], // Callbacks that are ran whenever a Query is rejected
propagateOnRejection: true, // When rejected, do you want to throw the error or report to the context?
}
}Depth Limit
This plugin is enabled by default.
Limit the depth of a document.
{
maxDepth: {
// enabled: true,
n: 6,
onAccept: [], // Callbacks that are ran whenever a Query is accepted
onReject: [], // Callbacks that are ran whenever a Query is rejected
propagateOnRejection: true, // When rejected, do you want to throw the error or report to the context?
}
}Token Limit
This plugin is enabled by default.
Limit the number of GraphQL tokens in a document.
{
maxTokens: {
// enabled: true,
n: 1000,
onAccept: [], // Callbacks that are ran whenever a Query is accepted
onReject: [], // Callbacks that are ran whenever a Query is rejected
propagateOnRejection: true, // When rejected, do you want to throw the error or do nothing?
}
}Contributing
Ensure you have read the Contributing Guide before contributing.
To setup your project, make sure you run the install-dev.sh script.
git clone git@github.com:Escape-Technologies/graphql-armor.git
cd graphql-armor
bash ./install-dev.shWe are using yarn as our package manager and the workspaces monorepo setup. Please read the associated documentation and feel free to open issues if you encounter problems when developing on our project!