@babel/runtime
Advanced tools
@@ -8,4 +8,4 @@ import objectWithoutPropertiesLoose from "./objectWithoutPropertiesLoose.js"; | ||
| if (Object.getOwnPropertySymbols) { | ||
| var s = Object.getOwnPropertySymbols(e); | ||
| for (r = 0; r < s.length; r++) o = s[r], t.includes(o) || {}.propertyIsEnumerable.call(e, o) && (i[o] = e[o]); | ||
| var n = Object.getOwnPropertySymbols(e); | ||
| for (r = 0; r < n.length; r++) o = n[r], -1 === t.indexOf(o) && {}.propertyIsEnumerable.call(e, o) && (i[o] = e[o]); | ||
| } | ||
@@ -12,0 +12,0 @@ return i; |
@@ -5,3 +5,3 @@ function _objectWithoutPropertiesLoose(r, e) { | ||
| for (var n in r) if ({}.hasOwnProperty.call(r, n)) { | ||
| if (e.includes(n)) continue; | ||
| if (-1 !== e.indexOf(n)) continue; | ||
| t[n] = r[n]; | ||
@@ -8,0 +8,0 @@ } |
@@ -8,4 +8,4 @@ const objectWithoutPropertiesLoose = require("./objectWithoutPropertiesLoose.js"); | ||
| if (Object.getOwnPropertySymbols) { | ||
| var s = Object.getOwnPropertySymbols(e); | ||
| for (r = 0; r < s.length; r++) o = s[r], t.includes(o) || {}.propertyIsEnumerable.call(e, o) && (i[o] = e[o]); | ||
| var n = Object.getOwnPropertySymbols(e); | ||
| for (r = 0; r < n.length; r++) o = n[r], -1 === t.indexOf(o) && {}.propertyIsEnumerable.call(e, o) && (i[o] = e[o]); | ||
| } | ||
@@ -12,0 +12,0 @@ return i; |
@@ -5,3 +5,3 @@ function _objectWithoutPropertiesLoose(r, e) { | ||
| for (var n in r) if ({}.hasOwnProperty.call(r, n)) { | ||
| if (e.includes(n)) continue; | ||
| if (-1 !== e.indexOf(n)) continue; | ||
| t[n] = r[n]; | ||
@@ -8,0 +8,0 @@ } |
+1
-1
| { | ||
| "name": "@babel/runtime", | ||
| "version": "8.0.0-alpha.15", | ||
| "version": "8.0.0-alpha.16", | ||
| "description": "babel's modular runtime helpers", | ||
@@ -5,0 +5,0 @@ "license": "MIT", |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
143252
0.02%