@angular-devkit/schematics
Advanced tools
+2
-2
| { | ||
| "name": "@angular-devkit/schematics", | ||
| "version": "9.0.0-next.10", | ||
| "version": "9.0.0-next.11", | ||
| "description": "Angular Schematics - Library", | ||
@@ -21,3 +21,3 @@ "main": "src/index.js", | ||
| "dependencies": { | ||
| "@angular-devkit/core": "9.0.0-next.10", | ||
| "@angular-devkit/core": "9.0.0-next.11", | ||
| "rxjs": "6.5.3" | ||
@@ -24,0 +24,0 @@ }, |
@@ -123,4 +123,4 @@ "use strict"; | ||
| } | ||
| exports.TaskScheduler = TaskScheduler; | ||
| TaskScheduler._taskIdCounter = 1; | ||
| exports.TaskScheduler = TaskScheduler; | ||
| class SchematicEngine { | ||
@@ -127,0 +127,0 @@ constructor(_host, _workflow) { |
@@ -9,2 +9,3 @@ "use strict"; | ||
| } | ||
| exports.BuiltinTaskExecutor = BuiltinTaskExecutor; | ||
| BuiltinTaskExecutor.NodePackage = { | ||
@@ -26,2 +27,1 @@ name: options_1.NodePackageName, | ||
| }; | ||
| exports.BuiltinTaskExecutor = BuiltinTaskExecutor; |
@@ -14,2 +14,2 @@ /** | ||
| } | ||
| export declare function validateOptionsWithSchema(registry: schema.SchemaRegistry): <T extends {}>(schematic: FileSystemSchematicDescription, options: T, context?: import("../src/index").TypedSchematicContext<import("./description").FileSystemCollectionDescription, FileSystemSchematicDescription> | undefined) => Observable<T>; | ||
| export declare function validateOptionsWithSchema(registry: schema.SchemaRegistry): <T extends {}>(schematic: FileSystemSchematicDescription, options: T, context?: import("../src").TypedSchematicContext<import("./description").FileSystemCollectionDescription, FileSystemSchematicDescription> | undefined) => Observable<T>; |
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
257875
0+ Added
- Removed