2
I Use This!
Very Low Activity
Analyzed about 12 hours ago. based on code collected about 12 hours ago.

Project Summary

Graph-based dependency injector for Java

Tags

dependency_injection dependency-injection inversion-of-control ioc java

Badges

In a Nutshell, grapht...

MIT
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Use Patent Claims

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

Include Install Instructions

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    you can subscribe to e-mail newsletters to receive update from the Open Hub blog
  • ...
    55% of companies leverage OSS for production infrastructure
  • ...
    search using multiple tags to find exactly what you need
About Project Security

Languages

Languages?height=75&width=75
Java
98%
2 Other
2%

30 Day Summary

Oct 29 2020 — Nov 28 2020

12 Month Summary

Nov 28 2019 — Nov 28 2020