@nocobase/plugin-users
Advanced tools
@@ -16,16 +16,16 @@ /** | ||
| "react": "18.2.0", | ||
| "@nocobase/client": "2.1.0-beta.34", | ||
| "@nocobase/client": "2.1.0-beta.35", | ||
| "antd": "5.24.2", | ||
| "@formily/core": "2.3.7", | ||
| "@nocobase/plugin-acl": "2.1.0-beta.34", | ||
| "@nocobase/plugin-acl": "2.1.0-beta.35", | ||
| "@emotion/css": "11.13.0", | ||
| "@nocobase/utils": "2.1.0-beta.34", | ||
| "@nocobase/client-v2": "2.1.0-beta.34", | ||
| "@nocobase/database": "2.1.0-beta.34", | ||
| "@nocobase/server": "2.1.0-beta.34", | ||
| "@nocobase/plugin-user-data-sync": "2.1.0-beta.34", | ||
| "@nocobase/plugin-ui-schema-storage": "2.1.0-beta.34", | ||
| "@nocobase/utils": "2.1.0-beta.35", | ||
| "@nocobase/client-v2": "2.1.0-beta.35", | ||
| "@nocobase/database": "2.1.0-beta.35", | ||
| "@nocobase/server": "2.1.0-beta.35", | ||
| "@nocobase/plugin-user-data-sync": "2.1.0-beta.35", | ||
| "@nocobase/plugin-ui-schema-storage": "2.1.0-beta.35", | ||
| "lodash": "4.18.1", | ||
| "@nocobase/actions": "2.1.0-beta.34", | ||
| "@nocobase/actions": "2.1.0-beta.35", | ||
| "sequelize": "6.35.2" | ||
| }; |
+2
-2
@@ -9,3 +9,3 @@ { | ||
| "description.zh-CN": "提供了基础的用户模型,以及创建人和最后更新人字段。", | ||
| "version": "2.1.0-beta.34", | ||
| "version": "2.1.0-beta.35", | ||
| "license": "Apache-2.0", | ||
@@ -35,3 +35,3 @@ "main": "./dist/server/index.js", | ||
| }, | ||
| "gitHead": "ca804833299c547f8d49f8d58f73273a4bfcd03c", | ||
| "gitHead": "74310d8b9e9581fcde14b5a93d12b41ddb5bb325", | ||
| "keywords": [ | ||
@@ -38,0 +38,0 @@ "Users & permissions" |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package