@babel/runtime-corejs3
Advanced tools
| function tsRewriteRelativeImportExtensions(t, e) { | ||
| return "string" == typeof t && /^\.\.?\//.test(t) ? t.replace(/\.(tsx)$|((?:\.d)?)((?:\.[^./]+)?)\.([cm]?)ts$/i, function (t, s, r, n, o) { | ||
| return s ? e ? ".jsx" : ".js" : !r || n && o ? r + n + "." + o.toLowerCase() + "js" : t; | ||
| }) : t; | ||
| } | ||
| export { tsRewriteRelativeImportExtensions as default }; |
| function tsRewriteRelativeImportExtensions(t, e) { | ||
| return "string" == typeof t && /^\.\.?\//.test(t) ? t.replace(/\.(tsx)$|((?:\.d)?)((?:\.[^./]+)?)\.([cm]?)ts$/i, function (t, s, r, n, o) { | ||
| return s ? e ? ".jsx" : ".js" : !r || n && o ? r + n + "." + o.toLowerCase() + "js" : t; | ||
| }) : t; | ||
| } | ||
| module.exports = tsRewriteRelativeImportExtensions, module.exports.__esModule = true, module.exports["default"] = module.exports; |
+10
-1
| { | ||
| "name": "@babel/runtime-corejs3", | ||
| "version": "7.26.10", | ||
| "version": "7.27.0", | ||
| "description": "babel's modular runtime helpers with core-js@3 polyfilling", | ||
@@ -758,2 +758,11 @@ "license": "MIT", | ||
| "./helpers/esm/toSetter": "./helpers/esm/toSetter.js", | ||
| "./helpers/tsRewriteRelativeImportExtensions": [ | ||
| { | ||
| "node": "./helpers/tsRewriteRelativeImportExtensions.js", | ||
| "import": "./helpers/esm/tsRewriteRelativeImportExtensions.js", | ||
| "default": "./helpers/tsRewriteRelativeImportExtensions.js" | ||
| }, | ||
| "./helpers/tsRewriteRelativeImportExtensions.js" | ||
| ], | ||
| "./helpers/esm/tsRewriteRelativeImportExtensions": "./helpers/esm/tsRewriteRelativeImportExtensions.js", | ||
| "./helpers/typeof": [ | ||
@@ -760,0 +769,0 @@ { |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
331596
0.37%539
0.37%5859
0.17%