@nocobase/plugin-users
Advanced tools
@@ -16,16 +16,16 @@ /** | ||
| "react": "18.2.0", | ||
| "@nocobase/client": "2.1.0-alpha.36", | ||
| "@nocobase/client": "2.1.0-alpha.37", | ||
| "antd": "5.24.2", | ||
| "@formily/core": "2.3.7", | ||
| "@nocobase/plugin-acl": "2.1.0-alpha.36", | ||
| "@nocobase/plugin-acl": "2.1.0-alpha.37", | ||
| "@emotion/css": "11.13.0", | ||
| "@nocobase/utils": "2.1.0-alpha.36", | ||
| "@nocobase/client-v2": "2.1.0-alpha.36", | ||
| "@nocobase/database": "2.1.0-alpha.36", | ||
| "@nocobase/server": "2.1.0-alpha.36", | ||
| "@nocobase/plugin-user-data-sync": "2.1.0-alpha.36", | ||
| "@nocobase/plugin-ui-schema-storage": "2.1.0-alpha.36", | ||
| "@nocobase/utils": "2.1.0-alpha.37", | ||
| "@nocobase/client-v2": "2.1.0-alpha.37", | ||
| "@nocobase/database": "2.1.0-alpha.37", | ||
| "@nocobase/server": "2.1.0-alpha.37", | ||
| "@nocobase/plugin-user-data-sync": "2.1.0-alpha.37", | ||
| "@nocobase/plugin-ui-schema-storage": "2.1.0-alpha.37", | ||
| "lodash": "4.18.1", | ||
| "@nocobase/actions": "2.1.0-alpha.36", | ||
| "@nocobase/actions": "2.1.0-alpha.37", | ||
| "sequelize": "6.35.2" | ||
| }; |
+2
-2
@@ -9,3 +9,3 @@ { | ||
| "description.zh-CN": "提供了基础的用户模型,以及创建人和最后更新人字段。", | ||
| "version": "2.1.0-alpha.36", | ||
| "version": "2.1.0-alpha.37", | ||
| "license": "Apache-2.0", | ||
@@ -35,3 +35,3 @@ "main": "./dist/server/index.js", | ||
| }, | ||
| "gitHead": "54cf3ac93b02ea9a409def6ebe4bdfdad07d0691", | ||
| "gitHead": "8b45f4586ea5b386b376188cfc1012ec12e9bc8b", | ||
| "keywords": [ | ||
@@ -38,0 +38,0 @@ "Users & permissions" |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package