@babel/runtime-corejs3
Advanced tools
@@ -35,3 +35,3 @@ import regeneratorDefine from "./regeneratorDefine.js"; | ||
| l = i[2]; | ||
| r > 3 ? (o = l === n) && (c = i[4] || 3, u = i[5] === e ? i[3] : i[5], i[4] = 3, i[5] = e) : i[0] <= d && ((o = r < 2 && d < i[1]) ? (c = 0, G.v = n, G.n = i[1]) : d < l && (o = r < 3 || i[0] > n || n > l) && (i[4] = r, i[5] = n, G.n = l, c = 0)); | ||
| r > 3 ? (o = l === n) && (u = i[(c = i[4]) ? 5 : (c = 3, 3)], i[4] = i[5] = e) : i[0] <= d && ((o = r < 2 && d < i[1]) ? (c = 0, G.v = n, G.n = i[1]) : d < l && (o = r < 3 || i[0] > n || n > l) && (i[4] = r, i[5] = n, G.n = l, c = 0)); | ||
| } | ||
@@ -38,0 +38,0 @@ if (o || r > 1) return a; |
@@ -35,3 +35,3 @@ const regeneratorDefine = require("./regeneratorDefine.js"); | ||
| l = i[2]; | ||
| r > 3 ? (o = l === n) && (c = i[4] || 3, u = i[5] === e ? i[3] : i[5], i[4] = 3, i[5] = e) : i[0] <= d && ((o = r < 2 && d < i[1]) ? (c = 0, G.v = n, G.n = i[1]) : d < l && (o = r < 3 || i[0] > n || n > l) && (i[4] = r, i[5] = n, G.n = l, c = 0)); | ||
| r > 3 ? (o = l === n) && (u = i[(c = i[4]) ? 5 : (c = 3, 3)], i[4] = i[5] = e) : i[0] <= d && ((o = r < 2 && d < i[1]) ? (c = 0, G.v = n, G.n = i[1]) : d < l && (o = r < 3 || i[0] > n || n > l) && (i[4] = r, i[5] = n, G.n = l, c = 0)); | ||
| } | ||
@@ -38,0 +38,0 @@ if (o || r > 1) return a; |
+2
-2
| { | ||
| "name": "@babel/runtime-corejs3", | ||
| "version": "8.0.0-beta.0", | ||
| "version": "8.0.0-beta.1", | ||
| "description": "babel's modular runtime helpers with core-js@3 polyfilling", | ||
@@ -16,3 +16,3 @@ "license": "MIT", | ||
| "dependencies": { | ||
| "core-js-pure": "^3.30.2" | ||
| "core-js-pure": "^3.43.0" | ||
| }, | ||
@@ -19,0 +19,0 @@ "exports": { |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
140561
-0.02%Updated