@shipengine/js-api
Advanced tools
@@ -13,2 +13,4 @@ import { Address } from "../addresses"; | ||
| export type LabelTrackingStatus = "unknown" | "in_transit" | "delivered" | "error"; | ||
| export type LabelVoidType = "refund_assist" | "manual"; | ||
| export type RefundStatus = "request_scheduled" | "pending" | "approved" | "rejected" | "excluded"; | ||
| /** | ||
@@ -98,7 +100,5 @@ * Columns available for label exports | ||
| * `refundStatus` is an optional string to filter results by refund status. | ||
| * Can be a single status or multiple comma-separated statuses. | ||
| * @example "pending" | ||
| * @example "pending,approved" | ||
| * Can be a single status or multiple comma-separated statuses | ||
| */ | ||
| refundStatus?: string; | ||
| refundStatus?: RefundStatus[] | RefundStatus; | ||
| /** | ||
@@ -170,4 +170,2 @@ * `serviceCode` is an optional string to limit results to only labels for | ||
| } & ListLabelsParams; | ||
| export type LabelVoidType = "refund_assist" | "manual"; | ||
| export type RefundStatus = "request_scheduled" | "pending" | "approved" | "rejected" | "excluded"; | ||
| export type RefundDetails = { | ||
@@ -174,0 +172,0 @@ amountApproved: Money | null; |
+1
-1
| { | ||
| "name": "@shipengine/js-api", | ||
| "version": "4.23.0", | ||
| "version": "4.23.1-next.0", | ||
| "main": "./index.js", | ||
@@ -5,0 +5,0 @@ "types": "./index.d.ts", |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
No v1
QualityPackage is not semver >=1. This means it is not stable and does not support ^ ranges.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
1614455
045744
02
100%