@angular-devkit/schematics
Advanced tools
+2
-2
| { | ||
| "name": "@angular-devkit/schematics", | ||
| "version": "9.0.0-next.0", | ||
| "version": "9.0.0-next.1", | ||
| "description": "Angular Schematics - Library", | ||
@@ -21,3 +21,3 @@ "main": "src/index.js", | ||
| "dependencies": { | ||
| "@angular-devkit/core": "9.0.0-next.0", | ||
| "@angular-devkit/core": "9.0.0-next.1", | ||
| "rxjs": "6.4.0" | ||
@@ -24,0 +24,0 @@ }, |
@@ -115,11 +115,7 @@ "use strict"; | ||
| assert(left, _content, right) { | ||
| if (left) { | ||
| if (this._assertLeft) { | ||
| throw new ContentCannotBeRemovedException(); | ||
| } | ||
| if (left && this._assertLeft) { | ||
| throw new ContentCannotBeRemovedException(); | ||
| } | ||
| if (right) { | ||
| if (this._assertRight) { | ||
| throw new ContentCannotBeRemovedException(); | ||
| } | ||
| if (right && this._assertRight) { | ||
| throw new ContentCannotBeRemovedException(); | ||
| } | ||
@@ -126,0 +122,0 @@ } |
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
257828
-0.03%6345
-0.06%+ Added
- Removed