@dotenvx/dotenvx
Advanced tools
+1
-1
| { | ||
| "version": "1.63.0", | ||
| "version": "1.64.0", | ||
| "name": "@dotenvx/dotenvx", | ||
@@ -4,0 +4,0 @@ "description": "secrets for agents–from the creator of `dotenv`", |
+10
-1
@@ -200,3 +200,3 @@ #!/usr/bin/env node | ||
| program.command('logout', { hidden: true }) | ||
| .description('optional: log out of your dotenvx account') | ||
| .description('log out of your dotenvx account') | ||
| .allowUnknownOption() | ||
@@ -208,2 +208,11 @@ .action(() => { | ||
| // dotenvx armor | ||
| program.command('armor', { hidden: true }) | ||
| .description('ARMORED KEYS ⛨') | ||
| .allowUnknownOption() | ||
| .action((args) => { | ||
| const rawArgs = ['ops', 'armor', ...process.argv.slice(3)] | ||
| executeDynamic(program, 'ops', rawArgs) | ||
| }) | ||
| // dotenvx help | ||
@@ -210,0 +219,0 @@ program.command('help [command]') |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Potential vulnerability
Supply chain riskInitial human review suggests the presence of a vulnerability in this package. It is pending further analysis and confirmation.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 10 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
AI-detected potential code anomaly
Supply chain riskAI has identified unusual behaviors that may pose a security risk.
Found 5 instances in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Potential vulnerability
Supply chain riskInitial human review suggests the presence of a vulnerability in this package. It is pending further analysis and confirmation.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 10 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
AI-detected potential code anomaly
Supply chain riskAI has identified unusual behaviors that may pose a security risk.
Found 5 instances in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
327768
0.25%5343
0.15%2767
0.25%