@percy/cli
Advanced tools
+12
-12
| { | ||
| "name": "@percy/cli", | ||
| "version": "1.31.14-beta.1", | ||
| "version": "1.31.14-beta.2", | ||
| "license": "MIT", | ||
@@ -34,14 +34,14 @@ "repository": { | ||
| "dependencies": { | ||
| "@percy/cli-app": "1.31.14-beta.1", | ||
| "@percy/cli-build": "1.31.14-beta.1", | ||
| "@percy/cli-command": "1.31.14-beta.1", | ||
| "@percy/cli-config": "1.31.14-beta.1", | ||
| "@percy/cli-doctor": "1.31.14-beta.1", | ||
| "@percy/cli-exec": "1.31.14-beta.1", | ||
| "@percy/cli-snapshot": "1.31.14-beta.1", | ||
| "@percy/cli-upload": "1.31.14-beta.1", | ||
| "@percy/client": "1.31.14-beta.1", | ||
| "@percy/logger": "1.31.14-beta.1" | ||
| "@percy/cli-app": "1.31.14-beta.2", | ||
| "@percy/cli-build": "1.31.14-beta.2", | ||
| "@percy/cli-command": "1.31.14-beta.2", | ||
| "@percy/cli-config": "1.31.14-beta.2", | ||
| "@percy/cli-doctor": "1.31.14-beta.2", | ||
| "@percy/cli-exec": "1.31.14-beta.2", | ||
| "@percy/cli-snapshot": "1.31.14-beta.2", | ||
| "@percy/cli-upload": "1.31.14-beta.2", | ||
| "@percy/client": "1.31.14-beta.2", | ||
| "@percy/logger": "1.31.14-beta.2" | ||
| }, | ||
| "gitHead": "dd6957822cc94d460fd9c043a44cc4c9c5fcba23" | ||
| "gitHead": "e4fce73023453b77cdef50aac1a9bd5eb70cd01a" | ||
| } |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
AI-detected potential code anomaly
Supply chain riskAI has identified unusual behaviors that may pose a security risk.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
AI-detected potential code anomaly
Supply chain riskAI has identified unusual behaviors that may pose a security risk.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
Updated
Updated