@adguard/scriptlets
Advanced tools
+1
-1
@@ -1,1 +0,1 @@ | ||
| version=2.2.15 | ||
| version=2.2.16 |
+1
-1
| export { scriptlets } from "./scriptlets/index.js"; | ||
| var version = "2.2.15"; | ||
| var version = "2.2.16"; | ||
@@ -5,0 +5,0 @@ var SCRIPTLETS_VERSION = version; |
@@ -163,2 +163,8 @@ import { redirectsCompatibilityTable, GenericPlatform, modifiersCompatibilityTable, RuleCategory, CosmeticRuleType, NetworkRuleType } from "@adguard/agtree"; | ||
| var preventConstructorNames = [ "prevent-constructor" ]; | ||
| var removeRequestQueryParameterNames = [ "remove-request-query-parameter", "abp-strip-fetch-query-parameter" ]; | ||
| var preventNavigationNames = [ "prevent-navigation" ]; | ||
| var AmazonApstagNames = [ "amazon-apstag", "ubo-amazon_apstag.js", "amazon_apstag.js" ]; | ||
@@ -250,2 +256,3 @@ | ||
| preventCanvasNames: preventCanvasNames, | ||
| preventConstructorNames: preventConstructorNames, | ||
| preventElementSrcLoadingNames: preventElementSrcLoadingNames, | ||
@@ -256,2 +263,3 @@ preventEvalIfNames: preventEvalIfNames, | ||
| preventInnerHTMLNames: preventInnerHTMLNames, | ||
| preventNavigationNames: preventNavigationNames, | ||
| preventPopadsNetNames: preventPopadsNetNames, | ||
@@ -269,2 +277,3 @@ preventRefreshNames: preventRefreshNames, | ||
| removeNodeTextNames: removeNodeTextNames, | ||
| removeRequestQueryParameterNames: removeRequestQueryParameterNames, | ||
| setAttrNames: setAttrNames, | ||
@@ -271,0 +280,0 @@ setConstantNames: setConstantNames, |
+5
-4
| { | ||
| "name": "@adguard/scriptlets", | ||
| "version": "2.2.15", | ||
| "version": "2.2.16", | ||
| "description": "AdGuard's JavaScript library of Scriptlets and Redirect resources", | ||
@@ -45,3 +45,3 @@ "type": "module", | ||
| "dependencies": { | ||
| "@adguard/agtree": "^4.0.0", | ||
| "@adguard/agtree": "^4.0.1", | ||
| "@types/trusted-types": "^2.0.7", | ||
@@ -99,3 +99,3 @@ "js-yaml": "^3.14.1" | ||
| "openurl": "^1.1.1", | ||
| "puppeteer": "^24.5.0", | ||
| "puppeteer": "24.35.0", | ||
| "qunit": "^2.22.0", | ||
@@ -127,6 +127,7 @@ "rimraf": "^6.0.1", | ||
| "test:smoke": "(cd tests/smoke/exports && ./test.sh)", | ||
| "lint": "pnpm lint:code && pnpm lint:types && pnpm lint:md", | ||
| "lint": "pnpm lint:code && pnpm lint:types && pnpm lint:md && pnpm lint:test-lists", | ||
| "lint:code": "eslint --cache .", | ||
| "lint:types": "tsc --noEmit", | ||
| "lint:md": "markdownlint .", | ||
| "lint:test-lists": "tsx scripts/lint-test-lists.ts", | ||
| "lint-staged": "lint-staged", | ||
@@ -133,0 +134,0 @@ "wiki": "pnpm wiki:build-table && pnpm wiki:build-docs", |
+6
-6
@@ -885,8 +885,8 @@ # AdGuard Scriptlets and Redirect Resources | ||
| |-----------------------|:--------| | ||
| | Chrome | ✅ 55 | | ||
| | Firefox | ✅ 52 | | ||
| | Edge | ✅ 15 | | ||
| | Opera | ✅ 42 | | ||
| | Safari | ✅ 13 | | ||
| | Internet Explorer | ❌ | | ||
| | Chrome | ✅ 55 | | ||
| | Firefox | ✅ 52 | | ||
| | Edge | ✅ 15 | | ||
| | Opera | ✅ 42 | | ||
| | Safari | ✅ 13 | | ||
| | Internet Explorer | ❌ | | ||
@@ -893,0 +893,0 @@ ## <a name="used-by"> Projects using Scriptlets |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
1489975
3.45%23568
3.97%32
14.29%54
8%Updated