@peerbit/log
Advanced tools
+15
-15
| { | ||
| "name": "@peerbit/log", | ||
| "version": "6.0.2-a54459d", | ||
| "version": "6.0.2-c89b0fa", | ||
| "description": "Append-only log CRDT", | ||
@@ -64,15 +64,15 @@ "author": "dao.xyz", | ||
| "@dao-xyz/borsh": "^6.0.0", | ||
| "@peerbit/any-store": "2.2.5-a54459d", | ||
| "@peerbit/blocks": "4.0.0-a54459d", | ||
| "@peerbit/blocks-interface": "2.0.0-a54459d", | ||
| "@peerbit/cache": "3.0.0-a54459d", | ||
| "@peerbit/crypto": "3.0.0-a54459d", | ||
| "@peerbit/indexer-sqlite3": "3.0.0-a54459d", | ||
| "@peerbit/indexer-interface": "3.0.0-a54459d", | ||
| "@peerbit/indexer-simple": "1.2.3-a54459d", | ||
| "@peerbit/keychain": "1.2.5-a54459d", | ||
| "@peerbit/pubsub-interface": "5.0.0-a54459d", | ||
| "@peerbit/stream-interface": "6.0.0-a54459d", | ||
| "@peerbit/logger": "2.0.0-a54459d", | ||
| "@peerbit/time": "3.0.0-a54459d", | ||
| "@peerbit/any-store": "2.2.5-c89b0fa", | ||
| "@peerbit/blocks": "4.0.0-c89b0fa", | ||
| "@peerbit/blocks-interface": "2.0.0-c89b0fa", | ||
| "@peerbit/cache": "3.0.0-c89b0fa", | ||
| "@peerbit/crypto": "3.0.0-c89b0fa", | ||
| "@peerbit/indexer-sqlite3": "3.0.0-c89b0fa", | ||
| "@peerbit/indexer-interface": "3.0.0-c89b0fa", | ||
| "@peerbit/indexer-simple": "1.2.3-c89b0fa", | ||
| "@peerbit/keychain": "1.2.5-c89b0fa", | ||
| "@peerbit/pubsub-interface": "5.0.0-c89b0fa", | ||
| "@peerbit/stream-interface": "6.0.0-c89b0fa", | ||
| "@peerbit/logger": "2.0.0-c89b0fa", | ||
| "@peerbit/time": "3.0.0-c89b0fa", | ||
| "libsodium-wrappers": "0.7.15", | ||
@@ -88,3 +88,3 @@ "libp2p": "^3.1.0", | ||
| "devDependencies": { | ||
| "@peerbit/test-utils": "3.0.2-a54459d", | ||
| "@peerbit/test-utils": "3.0.2-c89b0fa", | ||
| "@types/libsodium-wrappers": "^0.7.14", | ||
@@ -91,0 +91,0 @@ "@types/pidusage": "^2.0.5", |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
Updated
Updated