@angular-devkit/schematics
Advanced tools
+3
-2
| { | ||
| "name": "@angular-devkit/schematics", | ||
| "version": "8.1.0-beta.2", | ||
| "version": "8.1.0-beta.3", | ||
| "description": "Angular Schematics - Library", | ||
@@ -21,3 +21,3 @@ "main": "src/index.js", | ||
| "dependencies": { | ||
| "@angular-devkit/core": "8.1.0-beta.2", | ||
| "@angular-devkit/core": "8.1.0-beta.3", | ||
| "rxjs": "6.4.0" | ||
@@ -41,2 +41,3 @@ }, | ||
| "hooks": { | ||
| "pre-commit": "lint-staged", | ||
| "pre-push": "node ./bin/devkit-admin hooks/pre-push" | ||
@@ -43,0 +44,0 @@ } |
@@ -25,2 +25,3 @@ /** | ||
| readonly tasks: TaskConfiguration[]; | ||
| registerCollection(collectionName: string, collectionPath: string): void; | ||
| runSchematicAsync<SchematicSchemaT>(schematicName: string, opts?: SchematicSchemaT, tree?: Tree): Observable<UnitTestTree>; | ||
@@ -27,0 +28,0 @@ /** |
@@ -51,2 +51,5 @@ "use strict"; | ||
| get tasks() { return [...this._engineHost.tasks]; } | ||
| registerCollection(collectionName, collectionPath) { | ||
| this._engineHost.registerCollection(collectionName, collectionPath); | ||
| } | ||
| runSchematicAsync(schematicName, opts, tree) { | ||
@@ -53,0 +56,0 @@ const schematic = this._collection.createSchematic(schematicName, true); |
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
258082
0.1%6352
0.06%+ Added
- Removed