@php-wasm/node-8-5
Advanced tools
+5
-5
| { | ||
| "name": "@php-wasm/node-8-5", | ||
| "version": "3.0.52", | ||
| "version": "3.0.53", | ||
| "description": "PHP 8.5 WebAssembly binaries for node", | ||
@@ -35,6 +35,6 @@ "repository": { | ||
| "engines": { | ||
| "node": ">=20.18.3", | ||
| "npm": ">=10.1.0" | ||
| "node": ">=20.10.0", | ||
| "npm": ">=10.2.3" | ||
| }, | ||
| "gitHead": "fd79b4d41ec8858ecacde7a814818fac95c40246", | ||
| "gitHead": "01ab4186302ca07b56ac54acd122d17b5350b3e2", | ||
| "dependencies": { | ||
@@ -44,3 +44,3 @@ "ini": "4.1.2", | ||
| "ws": "8.18.3", | ||
| "@php-wasm/universal": "3.0.52" | ||
| "@php-wasm/universal": "3.0.53" | ||
| }, | ||
@@ -47,0 +47,0 @@ "packageManager": "npm@10.9.2", |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
Updated