@giwisoft/wc-split
Advanced tools
Comparing version 1.0.0 to 1.0.1
@@ -1,6 +0,1 @@ | ||
import { p as patchBrowser, g as globals, b as bootstrapLazy } from './core-5ca2dac3.js'; | ||
patchBrowser().then(options => { | ||
globals(); | ||
return bootstrapLazy([["wc-split",[[1,"wc-split",{"items":[1],"direction":[1],"debug":[4]}]]]], options); | ||
}); | ||
import{p as e,b as i}from"./p-ee2ff010.js";e().then(e=>i([["p-6le1496f",[[1,"wc-split",{items:[1],direction:[1],debug:[4]}]]]],e)); |
{ | ||
"name": "@giwisoft/wc-split", | ||
"version": "1.0.0", | ||
"version": "1.0.1", | ||
"description": "Unopinionated utilities for resizeable split views", | ||
@@ -5,0 +5,0 @@ "unpkg": "dist/wc-split/wc-split.js", |
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
857467
66
13531
11