@platformatic/foundation
Advanced tools
+6
-27
@@ -231,2 +231,3 @@ export function overridableValue (spec, defaultValue) { | ||
| type: 'string', | ||
| default: 'info', | ||
| oneOf: [ | ||
@@ -340,2 +341,3 @@ { | ||
| required: ['level'], | ||
| default: {}, | ||
@@ -610,3 +612,4 @@ additionalProperties: true | ||
| maxYoungGeneration: overridableValue({ type: 'number', minimum: 0 }, 128 * Math.pow(1024, 2)), // 128MB, | ||
| codeRangeSize: overridableValue({ type: 'number', minimum: 0 }, 268435456) | ||
| codeRangeSize: overridableValue({ type: 'number', minimum: 0 }, 268435456), | ||
| noHeapCheck: overridableValue({ type: 'boolean' }, false) | ||
| }, | ||
@@ -727,23 +730,2 @@ additionalProperties: false | ||
| export const compileCache = { | ||
| anyOf: [ | ||
| { type: 'boolean' }, | ||
| { | ||
| type: 'object', | ||
| properties: { | ||
| enabled: { | ||
| type: 'boolean', | ||
| default: true, | ||
| description: 'Enable Node.js module compile cache for faster startup' | ||
| }, | ||
| directory: { | ||
| type: 'string', | ||
| description: 'Directory to store compile cache. Defaults to .plt/compile-cache in app root' | ||
| } | ||
| }, | ||
| additionalProperties: false | ||
| } | ||
| ] | ||
| } | ||
| export const application = { | ||
@@ -893,4 +875,3 @@ type: 'object', | ||
| } | ||
| }, | ||
| compileCache | ||
| } | ||
| } | ||
@@ -1368,4 +1349,3 @@ } | ||
| }, | ||
| policies, | ||
| compileCache | ||
| policies | ||
| } | ||
@@ -1427,3 +1407,2 @@ | ||
| policies, | ||
| compileCache, | ||
| applications, | ||
@@ -1430,0 +1409,0 @@ runtimeProperties, |
+1
-1
| { | ||
| "name": "@platformatic/foundation", | ||
| "version": "3.31.0", | ||
| "version": "3.32.0-alpha.0", | ||
| "description": "Platformatic Foundation", | ||
@@ -5,0 +5,0 @@ "main": "index.js", |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
No v1
QualityPackage is not semver >=1. This means it is not stable and does not support ^ ranges.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
106407
-0.4%3155
-0.63%1
Infinity%