@rstack-dev/doc-ui
Advanced tools
@@ -124,2 +124,8 @@ .root-M0JNBp { | ||
| .popover-fmVcBt .ant-popover-container { | ||
| box-shadow: none; | ||
| background-color: #0000; | ||
| padding: 0; | ||
| } | ||
| .popover-fmVcBt .ant-popover-content { | ||
@@ -133,2 +139,3 @@ box-sizing: border-box; | ||
| overflow: hidden; | ||
| box-shadow: 0 6px 16px #00000014, 0 3px 6px -4px #0000001f, 0 9px 28px 8px #0000000d; | ||
| } | ||
@@ -135,0 +142,0 @@ |
+6
-3
| { | ||
| "name": "@rstack-dev/doc-ui", | ||
| "version": "1.12.2", | ||
| "version": "1.12.3", | ||
| "type": "module", | ||
@@ -56,3 +56,3 @@ "types": "./dist/index.d.ts", | ||
| "type": "git", | ||
| "url": "https://github.com/rspack-contrib/rstack-doc-ui" | ||
| "url": "https://github.com/rstackjs/rstack-doc-ui" | ||
| }, | ||
@@ -71,3 +71,4 @@ "files": [ | ||
| "lint:fix": "biome check --write --unsafe", | ||
| "bump": "npx bumpp" | ||
| "bump": "npx bumpp", | ||
| "chromatic": "chromatic" | ||
| }, | ||
@@ -95,2 +96,3 @@ "dependencies": { | ||
| "@storybook/react": "^10.1.5", | ||
| "@storybook/test": "9.0.0-alpha.2", | ||
| "@types/node": "~24.10.2", | ||
@@ -100,2 +102,3 @@ "@types/react": "^18.3.27", | ||
| "antd": "^6.1.0", | ||
| "chromatic": "^13.3.5", | ||
| "execa": "9.6.1", | ||
@@ -102,0 +105,0 @@ "fs-extra": "11.3.2", |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
1714602
0.02%39562
0.02%28
7.69%