@parcel/watcher
Advanced tools
+14
-14
| { | ||
| "name": "@parcel/watcher", | ||
| "version": "2.5.4", | ||
| "version": "2.5.6", | ||
| "main": "index.js", | ||
@@ -74,16 +74,16 @@ "types": "index.d.ts", | ||
| "optionalDependencies": { | ||
| "@parcel/watcher-darwin-x64": "2.5.4", | ||
| "@parcel/watcher-darwin-arm64": "2.5.4", | ||
| "@parcel/watcher-win32-x64": "2.5.4", | ||
| "@parcel/watcher-win32-arm64": "2.5.4", | ||
| "@parcel/watcher-win32-ia32": "2.5.4", | ||
| "@parcel/watcher-linux-x64-glibc": "2.5.4", | ||
| "@parcel/watcher-linux-x64-musl": "2.5.4", | ||
| "@parcel/watcher-linux-arm64-glibc": "2.5.4", | ||
| "@parcel/watcher-linux-arm64-musl": "2.5.4", | ||
| "@parcel/watcher-linux-arm-glibc": "2.5.4", | ||
| "@parcel/watcher-linux-arm-musl": "2.5.4", | ||
| "@parcel/watcher-android-arm64": "2.5.4", | ||
| "@parcel/watcher-freebsd-x64": "2.5.4" | ||
| "@parcel/watcher-darwin-x64": "2.5.6", | ||
| "@parcel/watcher-darwin-arm64": "2.5.6", | ||
| "@parcel/watcher-win32-x64": "2.5.6", | ||
| "@parcel/watcher-win32-arm64": "2.5.6", | ||
| "@parcel/watcher-win32-ia32": "2.5.6", | ||
| "@parcel/watcher-linux-x64-glibc": "2.5.6", | ||
| "@parcel/watcher-linux-x64-musl": "2.5.6", | ||
| "@parcel/watcher-linux-arm64-glibc": "2.5.6", | ||
| "@parcel/watcher-linux-arm64-musl": "2.5.6", | ||
| "@parcel/watcher-linux-arm-glibc": "2.5.6", | ||
| "@parcel/watcher-linux-arm-musl": "2.5.6", | ||
| "@parcel/watcher-android-arm64": "2.5.6", | ||
| "@parcel/watcher-freebsd-x64": "2.5.6" | ||
| } | ||
| } |
Sorry, the diff of this file is not supported yet
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
132498
0.06%