@agoric/lockdown
Advanced tools
Comparing version 0.1.2-dev-2c92c13.0 to 0.1.2-dev-3464e52.0
@@ -67,2 +67,14 @@ // commit-debug.js - debug version of commit.js | ||
// consoleTaming: 'unsafe', | ||
// Domain taming causes lockdown to throw an error if the Node.js domain | ||
// module has already been loaded, and causes loading the domain module | ||
// to throw an error if it is pulled into the working set later. | ||
// This is because domains may add domain properties to promises and other | ||
// callbacks and that these domain objects provide a means to escape | ||
// containment. | ||
// However, our platform still depends on systems like standardthings/esm | ||
// which ultimately pull in domains. | ||
// For now, we are resigned to leave this hole open, knowing that all | ||
// contract code will be run under XS to avoid this vulnerability. | ||
domainTaming: 'unsafe', | ||
}); |
{ | ||
"name": "@agoric/lockdown", | ||
"version": "0.1.2-dev-2c92c13.0+2c92c13", | ||
"version": "0.1.2-dev-3464e52.0+3464e52", | ||
"description": "wrappers for locking down SES the Agoric way", | ||
@@ -19,3 +19,3 @@ "type": "module", | ||
"dependencies": { | ||
"ses": "^0.14.3" | ||
"ses": "^0.15.3" | ||
}, | ||
@@ -56,3 +56,3 @@ "files": [ | ||
}, | ||
"gitHead": "2c92c138d3bf83846db39856ab7774ef49d0d9f8" | ||
"gitHead": "3464e52160772a220a86f3093d56b69ff7d2fe0f" | ||
} |
24
pre.js
@@ -79,5 +79,13 @@ // pre.js - set up the default lockdown function | ||
} | ||
rawLockdown(options); | ||
rawLockdown({ | ||
...options, | ||
// See comment on domainTaming below. | ||
domainTaming: 'unsafe', | ||
}); | ||
} else if (defaultOptions) { | ||
rawLockdown(defaultOptions); | ||
rawLockdown({ | ||
...defaultOptions, | ||
// See comment on domainTaming below. | ||
domainTaming: 'unsafe', | ||
}); | ||
} else { | ||
@@ -142,2 +150,14 @@ rawLockdown({ | ||
// consoleTaming: 'unsafe', | ||
// Domain taming causes lockdown to throw an error if the Node.js domain | ||
// module has already been loaded, and causes loading the domain module | ||
// to throw an error if it is pulled into the working set later. | ||
// This is because domains may add domain properties to promises and other | ||
// callbacks and that these domain objects provide a means to escape | ||
// containment. | ||
// However, our platform still depends on systems like standardthings/esm | ||
// which ultimately pull in domains. | ||
// For now, we are resigned to leave this hole open, knowing that all | ||
// contract code will be run under XS to avoid this vulnerability. | ||
domainTaming: 'unsafe', | ||
}); | ||
@@ -144,0 +164,0 @@ } |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Manifest confusion
Supply chain riskThis package has inconsistent metadata. This could be malicious or caused by an error when publishing the package.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Manifest confusion
Supply chain riskThis package has inconsistent metadata. This could be malicious or caused by an error when publishing the package.
Found 1 instance in 1 package
13420
246
+ Addedses@0.15.24(transitive)
- Removedses@0.14.5(transitive)
Updatedses@^0.15.3