@chatunity/baileys
Advanced tools
+4
-20
@@ -52,12 +52,3 @@ "use strict"; | ||
| let reconnectAttempts = 0; | ||
| const performanceConfig = (typeof Utils_1.getPerformanceConfig === 'function') | ||
| ? (0, Utils_1.getPerformanceConfig)() | ||
| : { | ||
| performance: { | ||
| retryDelay: 2000, | ||
| retryBackoffMultiplier: 2, | ||
| maxRetryDelay: 60000, | ||
| maxRetries: 10 | ||
| } | ||
| }; | ||
| const performanceConfig = (0, Utils_1.getPerformanceConfig)(); | ||
@@ -90,7 +81,2 @@ const handleReconnect = async () => { | ||
| } | ||
| ws.on('CB:success', () => { | ||
| reconnectAttempts = 0; | ||
| logger?.info('Connection successful, reset reconnect attempts'); | ||
| }); | ||
| } else { | ||
@@ -704,2 +690,3 @@ logger?.error('Max reconnection attempts reached'); | ||
| requestPairingCode, | ||
| /** Waits for the connection to WA to reach a state */ | ||
| waitForConnectionUpdate: (0, Utils_1.bindWaitForConnectionUpdate)(ev), | ||
@@ -1114,6 +1101,3 @@ sendWAMBuffer, | ||
| exports.makeSocket = makeSocket; | ||
| /** | ||
| * map the websocket error to the right type | ||
| * so it can be retried by the caller | ||
| * */ | ||
| function mapWebSocketError(handler) { | ||
@@ -1123,2 +1107,2 @@ return (error) => { | ||
| }; | ||
| } | ||
| } |
+1
-1
| { | ||
| "name": "@chatunity/baileys", | ||
| "version": "1.2.7", | ||
| "version": "1.2.8", | ||
| "description": "whatsapp api multidevice by ChatUnity", | ||
@@ -5,0 +5,0 @@ "keywords": [ |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
14898105
0124866
-0.01%