@lambda-lambda-lambda/cli
Advanced tools
+4
-0
@@ -184,1 +184,5 @@ # Changelog | ||
| - Replaced unsupported dependency (`find`) | ||
| ## [0.7.1] - 2025-09-15 | ||
| - Added quotes to `!Sub` interpolated values - `template.yaml` |
+1
-1
| { | ||
| "name": "@lambda-lambda-lambda/cli", | ||
| "description": "Command-line tool to create a new L³ application.", | ||
| "version": "0.7.0", | ||
| "version": "0.7.1", | ||
| "main": "index.js", | ||
@@ -6,0 +6,0 @@ "types": "types.d.ts", |
+1
-1
| # L³ CLI | ||
| [](https://badge.fury.io/js/@lambda-lambda-lambda%2Fcli) [](https://www.npmjs.com/package/@lambda-lambda-lambda/cli) [](https://app.travis-ci.com/github/lambda-lambda-lambda/cli) [](https://packagephobia.com/result?p=@lambda-lambda-lambda/cli) [](https://github.com/nuxy/no-ai-badge) | ||
| [](https://badge.fury.io/js/@lambda-lambda-lambda%2Fcli) [](https://www.npmjs.com/package/@lambda-lambda-lambda/cli) [](https://github.com/lambda-lambda-lambda/cli/actions) [](https://packagephobia.com/result?p=@lambda-lambda-lambda/cli) [](https://github.com/nuxy/no-ai-badge) | ||
@@ -5,0 +5,0 @@ Command-line tool to create a new [L³](https://github.com/lambda-lambda-lambda) application. |
@@ -17,3 +17,4 @@ { | ||
| "MD046": false | ||
| } | ||
| }, | ||
| "makefile.configureOnOpen": false | ||
| } |
@@ -22,6 +22,9 @@ AWSTemplateFormatVersion: 2010-09-09 | ||
| # | ||
| # Lambda execution role | ||
| # | ||
| LambdaEdgeRole: | ||
| Type: AWS::IAM::Role | ||
| Properties: | ||
| RoleName: !Sub ${AWS::StackName}-{{appName}} | ||
| RoleName: !Sub '${AWS::StackName}-{{appName}}' | ||
| AssumeRolePolicyDocument: | ||
@@ -39,2 +42,5 @@ Version: 2012-10-17 | ||
| # | ||
| # CloudFront configuration | ||
| # | ||
| CloudFrontConfig: | ||
@@ -41,0 +47,0 @@ Type: AWS::CloudFront::Distribution |
| import eslint from '@eslint/js'; | ||
| import {defineConfig} from 'eslint/config'; | ||
| import tseslint from 'typescript-eslint'; | ||
| export default defineConfig([ | ||
| eslint.configs.recommended, | ||
| tseslint.configs.recommended, | ||
| { | ||
| languageOptions: { | ||
| globals: { | ||
| es6: true, | ||
| node: true | ||
| }, | ||
| parserOptions: { | ||
| ecmaVersion: 2021, | ||
| sourceType: 'module' | ||
| } | ||
| }, | ||
| rules: { | ||
| 'array-bracket-spacing': [ | ||
| 2, | ||
| 'never' | ||
| ], | ||
| 'block-scoped-var': 2, | ||
| 'brace-style': [ | ||
| 2, | ||
| '1tbs' | ||
| ], | ||
| 'camelcase': 1, | ||
| 'computed-property-spacing': [ | ||
| 2, | ||
| 'never' | ||
| ], | ||
| 'curly': 2, | ||
| 'eol-last': 2, | ||
| 'eqeqeq': [ | ||
| 2, | ||
| 'smart' | ||
| ], | ||
| 'max-depth': [ | ||
| 1, | ||
| 3 | ||
| ], | ||
| 'new-cap': 0, | ||
| 'no-extend-native': 2, | ||
| 'no-mixed-spaces-and-tabs': 2, | ||
| 'no-trailing-spaces': 2, | ||
| 'no-unused-vars': 0, | ||
| 'no-use-before-define': [ | ||
| 2, | ||
| 'nofunc' | ||
| ], | ||
| 'object-curly-spacing': [ | ||
| 2, | ||
| 'never' | ||
| ], | ||
| 'quotes': [ | ||
| 2, | ||
| 'single', | ||
| 'avoid-escape' | ||
| ], | ||
| 'semi': [ | ||
| 2, | ||
| 'always' | ||
| ], | ||
| 'keyword-spacing': [ | ||
| 2, | ||
| { | ||
| 'before': true, | ||
| 'after': true | ||
| } | ||
| ], | ||
| 'space-unary-ops': 2 | ||
| } | ||
| } | ||
| ]); |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 4 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 4 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
59860
-1.9%44
-2.22%942
-7.28%