Your GraphQL API is wide open.
GQLLint locks it down.

Find query depth attacks, N+1 resolvers, over-fetching, auth gaps, and schema design issues — before attackers and performance problems find them for you.

$ clawhub install gqllint click to copy
gqllint scan

Your GraphQL layer is an attack surface.

A single deeply-nested query can bring down your entire API. One resolver with a database call inside a loop creates an N+1 that turns milliseconds into seconds. Most GraphQL APIs ship without depth limits, without complexity analysis, and without proper authorization on every field. GQLLint scans your resolvers, schemas, and client queries for anti-patterns so your GraphQL layer is fast, secure, and production-ready.

90
Detection patterns
6
Check categories
100%
Local — zero telemetry
0
Dependencies

What GQLLint Catches

90 checks across 6 categories, covering every aspect of GraphQL security, performance, and schema quality.

QD
📏

Query Depth

Detects missing query depth limits, no max complexity configuration, unbounded nested selections, recursive type definitions without depth guards, and APIs vulnerable to depth-based denial of service attacks.

15 checks
RN
📈

Resolver N+1

Finds database queries inside resolver map/forEach loops, missing DataLoader usage for batching, unbatched HTTP calls in list resolvers, and resolver patterns that turn a single query into hundreds of database hits.

15 checks
OF
📦

Over/Under Fetching

Catches resolvers that SELECT * regardless of requested fields, missing field-level data loading, client queries requesting all fields, unused fragments, and patterns that waste bandwidth and database resources.

15 checks
RL
🔒

Rate Limiting & Auth

Detects mutations without authentication checks, missing field-level authorization, no rate limiting on expensive queries, introspection enabled in production, and resolvers that expose data without proper access control.

15 checks
SD
🏗

Schema Design

Finds non-nullable fields without defaults, missing pagination on list types, God types with too many fields, inconsistent naming conventions, missing deprecation notices, and schema patterns that break client compatibility.

15 checks
CQ
💻

Client Query Safety

Catches template literal interpolation in gql queries, dynamic query construction from user input, missing persisted queries, client-side query strings without whitelisting, and injection vulnerabilities in query building.

15 checks

GQLLint vs. the alternatives

Purpose-built for GraphQL security and performance. Not a schema validator pretending to catch anti-patterns.

Capability GQLLint Manual Review graphql-eslint Apollo Studio Stellate
Query depth attack detection ✓ 15 rules Ad hoc Partial Partial
N+1 resolver detection ✓ 15 rules Ad hoc Partial
Over/under fetching analysis ✓ 15 rules Partial
Auth & rate limiting checks ✓ 15 rules Ad hoc Partial
Schema design analysis ✓ 15 rules Ad hoc Partial
Client query safety ✓ 15 rules Ad hoc Partial
Static analysis (no runtime)
100% local / zero telemetry
Score & grading system Partial
Zero configuration N/A

Simple, transparent pricing

Start scanning for free. Upgrade when your GraphQL layer demands it.

Free
$0/mo
For solo developers who want basic GraphQL safety.
  • 30 detection patterns
  • Query Depth (QD) category
  • Schema Design (SD) category
  • Terminal report output
  • Basic scoring & grading
  • Community support
Install Free
Team
$39/mo
For teams enforcing GraphQL standards across all repos.
  • All 90 detection patterns
  • Everything in Pro
  • Over/Under Fetching (OF) category
  • Client Query Safety (CQ) category
  • CI/CD integration
  • Custom rule definitions
  • Priority support

Get notified about updates

No spam. One email per week max. Unsubscribe anytime.

Your GraphQL API deserves a security audit

Install GQLLint in 30 seconds. Find every depth attack, N+1 resolver, and auth gap before your attackers find them for you.

$ clawhub install gqllint click to copy