@phero/server
Advanced tools
@@ -165,3 +165,3 @@ "use strict"; | ||
| // Validation error(s) | ||
| res.write(JSON.stringify(rpcResult.errors, null, 4)); | ||
| res.write(JSON.stringify({ errors: rpcResult.errors }, null, 4)); | ||
| this.eventEmitter.emit({ | ||
@@ -186,3 +186,3 @@ type: "RPC_FAILED_VALIDATION_ERROR", | ||
| // Error is thrown | ||
| res.write(JSON.stringify(rpcResult.error)); | ||
| res.write(JSON.stringify({ error: rpcResult.error })); | ||
| this.eventEmitter.emit({ | ||
@@ -189,0 +189,0 @@ type: "RPC_FAILED_FUNCTION_ERROR", |
| { | ||
| "name": "@phero/server", | ||
| "version": "0.10.4", | ||
| "version": "0.10.5-alpha.0", | ||
| "main": "dist/index.js", | ||
@@ -43,3 +43,3 @@ "description": "Server library for Phero", | ||
| }, | ||
| "gitHead": "b706e19021387735b9c927ccebd90de4c9105f62" | ||
| "gitHead": "6e5a24d6fe9c527190c6df76786714f3bb523b1a" | ||
| } |
+2
-2
| { | ||
| "name": "@phero/server", | ||
| "version": "0.10.4", | ||
| "version": "0.10.5-alpha.0", | ||
| "main": "dist/index.js", | ||
@@ -43,3 +43,3 @@ "description": "Server library for Phero", | ||
| }, | ||
| "gitHead": "b706e19021387735b9c927ccebd90de4c9105f62" | ||
| "gitHead": "6e5a24d6fe9c527190c6df76786714f3bb523b1a" | ||
| } |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
109538
0.04%