@rstack-dev/doc-ui
Advanced tools
@@ -29,3 +29,3 @@ import './index.css'; | ||
| return /*#__PURE__*/ jsx("div", { | ||
| className: getClassName(index_module.blogBackButton, className), | ||
| className: getClassName(index_module.blogBackButton, 'rp-not-doc', className), | ||
| children: /*#__PURE__*/ jsx(Link, { | ||
@@ -32,0 +32,0 @@ href: blogIndexPath, |
@@ -52,2 +52,4 @@ .frame-_5e87N { | ||
| background: var(--rs-blog-list-card-bg); | ||
| -webkit-backdrop-filter: blur(1px); | ||
| backdrop-filter: blur(1px); | ||
| box-sizing: border-box; | ||
@@ -140,3 +142,3 @@ border-radius: 24px; | ||
| .clampedDescription-A_BULP { | ||
| -webkit-line-clamp: 3; | ||
| -webkit-line-clamp: 6; | ||
| -webkit-box-orient: vertical; | ||
@@ -143,0 +145,0 @@ display: -webkit-box; |
@@ -359,3 +359,3 @@ import './index.css'; | ||
| return /*#__PURE__*/ jsxs("div", { | ||
| className: getClassName(index_module.blogPage, className), | ||
| className: getClassName(index_module.blogPage, 'rp-not-doc', className), | ||
| children: [ | ||
@@ -362,0 +362,0 @@ title || subtitle ? /*#__PURE__*/ jsxs("header", { |
+1
-1
| { | ||
| "name": "@rstack-dev/doc-ui", | ||
| "version": "1.13.0", | ||
| "version": "1.13.1", | ||
| "type": "module", | ||
@@ -5,0 +5,0 @@ "types": "./dist/index.d.ts", |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
1760290
0.01%40888
0