@brasilindoc/integration-products
Advanced tools
Comparing version 3.3.0 to 3.3.1
{ | ||
"name": "@brasilindoc/integration-products", | ||
"version": "3.3.0", | ||
"version": "3.3.1", | ||
"engines": { | ||
@@ -15,4 +15,2 @@ "node": "^18.14.0" | ||
"lint": "prettier --end-of-line lf --write . && npx eslint --fix src/**/*", | ||
"prepare": "npm run build", | ||
"prepublishOnly": "npm test", | ||
"preversion": "npm run lint", | ||
@@ -58,4 +56,5 @@ "version": "git add -A src", | ||
"entry": ["src"], | ||
"dts": true | ||
"clean": true, | ||
"tsconfig": "tsconfig.json" | ||
} | ||
} |
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
3865684
113072
23
66
15