Top Ruby Gems: https://github.com/rack/rack
rack ruby web
Score: 37.20112424822185
Last synced: about 13 hours ago
JSON representation
Repository metadata:
A modular Ruby web server interface.
- Host: GitHub
- URL: https://github.com/rack/rack
- Owner: rack
- License: other
- Created: 2008-12-24T03:03:12.000Z (about 17 years ago)
- Default Branch: main
- Last Pushed: 2026-01-10T23:45:14.000Z (24 days ago)
- Last Synced: 2026-01-11T01:06:30.292Z (24 days ago)
- Topics: rack, ruby, web
- Language: Ruby
- Homepage:
- Size: 10 MB
- Stars: 5,085
- Watchers: 151
- Forks: 1,659
- Open Issues: 13
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- Contributing: CONTRIBUTING.md
- License: MIT-LICENSE
- Security: SECURITY.md
Owner metadata:
- Name: Official Rack repositories
- Login: rack
- Email:
- Kind: organization
- Description:
- Website: http://rack.github.com
- Location:
- Twitter:
- Company:
- Icon url: https://avatars.githubusercontent.com/u/42379?v=4
- Repositories: 10
- Last Synced at: 2024-03-25T19:32:49.958Z
- Profile URL: https://github.com/rack
GitHub Events
Total
- Create event: 51
- Delete event: 25
- Discussion event: 1
- Fork event: 35
- Issue comment event: 437
- Issues event: 86
- Pull request event: 141
- Pull request review comment event: 170
- Pull request review event: 237
- Push event: 239
- Watch event: 163
- Total: 1585
Last Year
- Create event: 47
- Delete event: 23
- Discussion event: 1
- Fork event: 35
- Issue comment event: 414
- Issues event: 84
- Pull request event: 133
- Pull request review comment event: 164
- Pull request review event: 228
- Push event: 231
- Watch event: 147
- Total: 1507
Committers metadata
Last synced: 3 months ago
Total Commits: 2,775
Total Committers: 557
Avg Commits per committer: 4.982
Development Distribution Score (DDS): 0.904
Commits in past year: 91
Committers in past year: 27
Avg Commits per committer in past year: 3.37
Development Distribution Score (DDS) in past year: 0.505
| Name | Commits | |
|---|---|---|
| Samuel Williams | s****s@o****z | 266 |
| Leah Neukirchen | l****h@v****g | 262 |
| James Tucker | j****r@g****m | 228 |
| Jeremy Evans | c****e@j****t | 210 |
| Aaron Patterson | a****n@g****m | 177 |
| Scytrin dai Kinthra | s****n@g****m | 105 |
| Joshua Peek | j****h@j****m | 101 |
| Konstantin Haase | k****s@g****m | 63 |
| Michael Fellinger | m****r@g****m | 44 |
| Santiago Pastorino | s****o@w****m | 44 |
| Ryan Tomayko | r****o@g****m | 31 |
| Jeremy Kemper | j****y@b****t | 27 |
| James Tucker | r****i@g****m | 24 |
| deepj | d****a@g****m | 23 |
| José Valim | j****m@g****m | 22 |
| Christoffer Sawicki | c****i@g****m | 20 |
| Ravil Bayramgalin | b****a@e****m | 17 |
| Eric Wong | n****n@y****t | 16 |
| Eric Wong | e****@8****g | 14 |
| Lars Gierth | l****h@g****m | 14 |
| Rafael Mendonça França | r****a@g****m | 14 |
| Oscar Del Ben | o****r@o****m | 14 |
| Postmodern | p****3@g****m | 13 |
| eileencodes | e****s@g****m | 13 |
| Nick Adams | n****k@n****k | 12 |
| Olle Jonsson | o****n@a****m | 12 |
| Hongli Lai (Phusion) | h****i@p****l | 12 |
| Thomas Klemm | g****b@t****u | 12 |
| Yoshiyuki Hirano | y****o@m****m | 12 |
| Earlopain | 1****n | 11 |
| and 527 more... | ||
Issue and Pull Request metadata
Last synced: 3 months ago
Total issues: 139
Total pull requests: 417
Average time to close issues: 4 months
Average time to close pull requests: about 1 month
Total issue authors: 103
Total pull request authors: 96
Average comments per issue: 5.29
Average comments per pull request: 2.84
Merged pull request: 313
Bot issues: 0
Bot pull requests: 5
Past year issues: 53
Past year pull requests: 128
Past year average time to close issues: 7 days
Past year average time to close pull requests: 7 days
Past year issue authors: 37
Past year pull request authors: 38
Past year average comments per issue: 2.06
Past year average comments per pull request: 2.38
Past year merged pull request: 83
Past year bot issues: 0
Past year bot pull requests: 1
Top Issue Authors
- ioquatix (27)
- catatsuy (3)
- Fjan (3)
- lloeki (2)
- gegenelnet (2)
- LevitatingBusinessMan (2)
- radar (2)
- mikgry (2)
- doriantaylor (2)
- trak3r (1)
- leviwilson (1)
- larouxn (1)
- JunichiIto (1)
- jurruh (1)
- dmix (1)
Top Pull Request Authors
- ioquatix (121)
- jeremyevans (66)
- Earlopain (34)
- dentarg (14)
- skipkayhil (8)
- casperisfine (6)
- MSP-Greg (5)
- dependabot[bot] (5)
- byroot (4)
- sandipransing (4)
- willbryant (4)
- alexanderadam (4)
- adam12 (4)
- tenderlove (4)
- tomharvey (3)
Top Issue Labels
- Documentation (6)
- SPEC (3)
- Maintenance (2)
- Bug (2)
- Needs Feedback (1)
Top Pull Request Labels
- Backport (7)
- dependencies (5)
- Bug (4)
- Maintenance (3)
- SPEC (3)
- hacktoberfest-accepted (2)
- Needs Feedback (1)
- github_actions (1)
- Feature (1)
Package metadata
- Total packages: 3
-
Total downloads:
- rubygems: 2,352,048,227 total
- Total docker downloads: 2,693,372,318
- Total dependent packages: 3,634 (may contain duplicates)
- Total dependent repositories: 1,043,594 (may contain duplicates)
- Total versions: 399
- Total maintainers: 6
- Total advisories: 36
gem.coop: rack
Rack provides a minimal, modular and adaptable interface for developing web applications in Ruby. By wrapping HTTP requests and responses in the simplest way possible, it unifies and distills the API for web servers, web frameworks, and software in between (the so-called middleware) into a single method call.
- Homepage: https://github.com/rack/rack
- Documentation: http://www.rubydoc.info/gems/rack/
- Licenses: MIT
- Latest release: 3.2.3 (published 4 months ago)
- Last Synced: 2025-11-02T06:03:03.914Z (3 months ago)
- Versions: 169
- Dependent Packages: 0
- Dependent Repositories: 0
- Downloads: 1,175,978,606 Total
- Docker Downloads: 1,346,686,159
-
Rankings:
- Dependent repos count: 0.0%
- Dependent packages count: 0.0%
- Average: 0.001%
- Downloads: 0.004%
- Maintainers (6)
-
Advisories:
- Rack allows Percent-encoded cookies to overwrite existing prefixed cookie names
- Rack Gem Subject to Denial of Service via Hash Collisions
- Possible shell escape sequence injection vulnerability in Rack
- Rack is vulnerable to a memory-exhaustion DoS through unbounded URL-encoded body parsing
- Rack: Multipart parser buffers large non‑file fields entirely in memory, enabling DoS (memory exhaustion)
- Rack rubygems receiving excessively long lines triggers out-of-memory error
- Rack vulnerable to Denial of Service
- Rack session gets restored after deletion
- Possible Log Injection in Rack::CommonLogger
- Rack vulnerable to Denial of Service via large parameter depth request
- Denial of Service Vulnerability in Rack Multipart Parsing
- Rack has a Possible Information Disclosure Vulnerability
- Directory traversal in Rack::Directory app bundled with Rack
- Rack vulnerable to Cross-site Scripting
- Rack vulnerable to Denial of Service
- Possible Denial of Service Vulnerability in Rack's header parsing
- Moderate severity vulnerability that affects rack
- Rack has an Unbounded-Parameter DoS in Rack::QueryParser
- Denial of service via multipart parsing in Rack
- Rack's multipart parser buffers unbounded per-part headers, enabling DoS (memory exhaustion)
- Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion)
- Rack ReDoS Vulnerability in HTTP Accept Headers Parsing
- Escape Sequence Injection vulnerability in Rack lead to Possible Log Injection
- Rack Header Parsing leads to Possible Denial of Service Vulnerability
- Rack Vulnerable to Path Traversal
- Rack has an unsafe default in Rack::QueryParser allows params_limit bypass via semicolon-separated parameters
- Possible Information Leak / Session Hijack Vulnerability in Rack
- ReDoS Vulnerability in Rack::Multipart handle_mime_head
- Rack vulnerable to ReDoS in content type parsing (2nd degree polynomial)
- Rack has possible DoS Vulnerability in Multipart MIME parsing
- Rack has possible DoS Vulnerability with Range Header
- Denial of service via header parsing in Rack
- Local File Inclusion in Rack::Static
- Denial of Service Vulnerability in Rack Content-Disposition parsing
- Rack arbitrary code execution via timing attack
- Rack vulnerable to REDoS
rubygems.org: rack
Rack provides a minimal, modular and adaptable interface for developing web applications in Ruby. By wrapping HTTP requests and responses in the simplest way possible, it unifies and distills the API for web servers, web frameworks, and software in between (the so-called middleware) into a single method call.
- Homepage: https://github.com/rack/rack
- Documentation: http://www.rubydoc.info/gems/rack/
- Licenses: MIT
- Latest release: 3.2.4 (published 3 months ago)
- Last Synced: 2025-11-02T15:31:54.994Z (3 months ago)
- Versions: 172
- Dependent Packages: 3,634
- Dependent Repositories: 1,043,594
- Downloads: 1,176,069,621 Total
- Docker Downloads: 1,346,686,159
-
Rankings:
- Dependent repos count: 0.004%
- Downloads: 0.007%
- Dependent packages count: 0.014%
- Average: 0.091%
- Docker downloads count: 0.098%
- Forks count: 0.146%
- Stargazers count: 0.275%
- Maintainers (6)
-
Advisories:
- Rack allows Percent-encoded cookies to overwrite existing prefixed cookie names
- Rack Gem Subject to Denial of Service via Hash Collisions
- Possible shell escape sequence injection vulnerability in Rack
- Rack is vulnerable to a memory-exhaustion DoS through unbounded URL-encoded body parsing
- Rack: Multipart parser buffers large non‑file fields entirely in memory, enabling DoS (memory exhaustion)
- Rack rubygems receiving excessively long lines triggers out-of-memory error
- Rack vulnerable to Denial of Service
- Rack session gets restored after deletion
- Possible Log Injection in Rack::CommonLogger
- Rack vulnerable to Denial of Service via large parameter depth request
- Denial of Service Vulnerability in Rack Multipart Parsing
- Rack has a Possible Information Disclosure Vulnerability
- Directory traversal in Rack::Directory app bundled with Rack
- Rack vulnerable to Cross-site Scripting
- Rack vulnerable to Denial of Service
- Possible Denial of Service Vulnerability in Rack's header parsing
- Moderate severity vulnerability that affects rack
- Rack has an Unbounded-Parameter DoS in Rack::QueryParser
- Denial of service via multipart parsing in Rack
- Rack's multipart parser buffers unbounded per-part headers, enabling DoS (memory exhaustion)
- Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion)
- Rack ReDoS Vulnerability in HTTP Accept Headers Parsing
- Escape Sequence Injection vulnerability in Rack lead to Possible Log Injection
- Rack Header Parsing leads to Possible Denial of Service Vulnerability
- Rack Vulnerable to Path Traversal
- Rack has an unsafe default in Rack::QueryParser allows params_limit bypass via semicolon-separated parameters
- Possible Information Leak / Session Hijack Vulnerability in Rack
- ReDoS Vulnerability in Rack::Multipart handle_mime_head
- Rack vulnerable to ReDoS in content type parsing (2nd degree polynomial)
- Rack has possible DoS Vulnerability in Multipart MIME parsing
- Rack has possible DoS Vulnerability with Range Header
- Denial of service via header parsing in Rack
- Local File Inclusion in Rack::Static
- Denial of Service Vulnerability in Rack Content-Disposition parsing
- Rack arbitrary code execution via timing attack
- Rack vulnerable to REDoS
proxy.golang.org: github.com/rack/rack
- Homepage:
- Documentation: https://pkg.go.dev/github.com/rack/rack#section-documentation
- Licenses: other
- Latest release: v3.2.3+incompatible (published 4 months ago)
- Last Synced: 2025-11-02T06:03:03.242Z (3 months ago)
- Versions: 58
- Dependent Packages: 0
- Dependent Repositories: 0
-
Rankings:
- Forks count: 0.578%
- Stargazers count: 0.977%
- Average: 5.483%
- Dependent packages count: 9.576%
- Dependent repos count: 10.802%
Dependencies
- rdoc >= 0 development
- rubocop >= 0
- rubocop-packaging >= 0
- webrick >= 0
- bundler >= 0 development
- minitest ~> 5.0 development
- minitest-global_expectations >= 0 development
- rake >= 0 development
- actions/checkout v3 composite
- actions/dependency-review-action v3 composite
- actions/checkout v3 composite
- ruby/setup-ruby v1 composite
- actions/checkout v3 composite
- ruby/setup-ruby v1 composite