@platformatic/foundation
Advanced tools
+1
-0
@@ -196,2 +196,3 @@ import { FastifyError } from '@fastify/error' | ||
| export declare function noop (): void | ||
| export declare function createDebugLogger (subject: string): debug.Debugger | ||
@@ -198,0 +199,0 @@ export declare const abstractLogger: Logger |
+4
-2
@@ -48,5 +48,7 @@ import { bgGreen, black, bold, green, isColorSupported } from 'colorette' | ||
| export function logo (color = true) { | ||
| export function logo (color = true, name = undefined) { | ||
| name ??= getExecutableName() | ||
| /* c8 ignore next - else */ | ||
| const executableName = color && isColorSupported ? bold(getExecutableName()) : getExecutableName() | ||
| const executableName = color && isColorSupported ? bold(name) : name | ||
| const str = ` | ||
@@ -53,0 +55,0 @@ |
+6
-0
@@ -0,1 +1,2 @@ | ||
| import debug from 'debug' | ||
| import { createRequire } from 'node:module' | ||
@@ -158,2 +159,7 @@ import { hostname } from 'node:os' | ||
| /* c8 ignore next 3 - Debug utility */ | ||
| export function createDebugLogger (subject) { | ||
| return debug(`plt:${subject}`) | ||
| } | ||
| /* c8 ignore start - Nothing to test */ | ||
@@ -160,0 +166,0 @@ export function noop () {} |
+4
-0
@@ -1123,2 +1123,6 @@ export function overridableValue (spec, defaultValue) { | ||
| additionalProperties: false | ||
| }, | ||
| socket: { | ||
| type: 'string', | ||
| description: 'Custom path for the control socket. If not specified, uses the default platform-specific location.' | ||
| } | ||
@@ -1125,0 +1129,0 @@ }, |
+2
-1
| { | ||
| "name": "@platformatic/foundation", | ||
| "version": "3.35.1", | ||
| "version": "3.36.0", | ||
| "description": "Platformatic Foundation", | ||
@@ -26,2 +26,3 @@ "main": "index.js", | ||
| "colorette": "^2.0.19", | ||
| "debug": "^4.4.3", | ||
| "fast-json-patch": "^3.1.1", | ||
@@ -28,0 +29,0 @@ "json5": "^2.2.3", |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 3 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
109290
0.42%3237
0.34%16
6.67%+ Added
+ Added
+ Added