@react-email/tailwind
Advanced tools
+14
-8
| { | ||
| "name": "@react-email/tailwind", | ||
| "version": "2.0.1", | ||
| "version": "2.0.2", | ||
| "description": "A React component to wrap emails with Tailwind CSS", | ||
@@ -36,16 +36,22 @@ "sideEffects": false, | ||
| "engines": { | ||
| "node": ">=22.0.0" | ||
| "node": ">=20.0.0" | ||
| }, | ||
| "devEngines": { | ||
| "runtime": { | ||
| "name": "node", | ||
| "version": ">=22.0.0" | ||
| } | ||
| }, | ||
| "peerDependencies": { | ||
| "react": "^18.0 || ^19.0 || ^19.0.0-rc", | ||
| "@react-email/button": "0.2.0", | ||
| "@react-email/body": "0.2.0", | ||
| "@react-email/button": "0.2.0", | ||
| "@react-email/code-block": "0.2.0", | ||
| "@react-email/container": "0.0.15", | ||
| "@react-email/code-inline": "0.0.5", | ||
| "@react-email/heading": "0.0.15", | ||
| "@react-email/hr": "0.0.11", | ||
| "@react-email/code-inline": "0.0.5", | ||
| "@react-email/img": "0.0.11", | ||
| "@react-email/preview": "0.0.13", | ||
| "@react-email/link": "0.0.12", | ||
| "@react-email/preview": "0.0.13", | ||
| "@react-email/text": "0.1.5" | ||
@@ -94,3 +100,3 @@ }, | ||
| "typescript": "5.8.3", | ||
| "vite": "6.3.6", | ||
| "vite": "6.4.1", | ||
| "vite-plugin-dts": "4.5.3", | ||
@@ -100,4 +106,4 @@ "yalc": "1.0.0-pre.53", | ||
| "@react-email/head": "0.0.12", | ||
| "@react-email/heading": "0.0.15", | ||
| "@react-email/hr": "0.0.11", | ||
| "@react-email/heading": "0.0.15", | ||
| "@react-email/html": "0.0.11", | ||
@@ -112,3 +118,3 @@ "@react-email/link": "0.0.12", | ||
| "dependencies": { | ||
| "tailwindcss": "^4.1.12" | ||
| "tailwindcss": "^4.1.18" | ||
| }, | ||
@@ -115,0 +121,0 @@ "scripts": { |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
2113590
0Updated