@stackone/audit
Advanced tools
+11
-2
@@ -113,2 +113,3 @@ import * as redis from "redis"; | ||
| deleteData?(key: string): Promise<boolean>; | ||
| close?(): Promise<void> | void; | ||
| } | ||
@@ -167,2 +168,6 @@ type PubSubListener<ReturnsBuffer extends boolean = false> = <T extends (ReturnsBuffer extends true ? Buffer : string)>(message: T, channel: T) => unknown; | ||
| //#endregion | ||
| //#region ../transport/src/parsers/types.d.ts | ||
| declare const QueryArrayFormats: readonly ["repeat", "brackets", "comma"]; | ||
| type QueryArrayFormat = (typeof QueryArrayFormats)[number]; | ||
| //#endregion | ||
| //#region ../transport/src/httpClient/types.d.ts | ||
@@ -172,4 +177,8 @@ type HttpHeaders = { | ||
| }; | ||
| type HttpQueryParamValue = { | ||
| value: string | string[]; | ||
| arrayFormat?: QueryArrayFormat; | ||
| }; | ||
| type HttpQueryParams = { | ||
| [key: string]: string; | ||
| [key: string]: string | string[] | HttpQueryParamValue; | ||
| }; | ||
@@ -265,3 +274,3 @@ declare const HttpMethods: readonly ["get", "post", "put", "delete", "patch"]; | ||
| projectSecureId?: string; | ||
| organizationId?: number; | ||
| organizationId?: number | string; | ||
| environment?: string; | ||
@@ -268,0 +277,0 @@ authConfigKey?: string; |
+11
-2
@@ -113,2 +113,3 @@ import { Kafka } from "kafkajs"; | ||
| deleteData?(key: string): Promise<boolean>; | ||
| close?(): Promise<void> | void; | ||
| } | ||
@@ -167,2 +168,6 @@ type PubSubListener<ReturnsBuffer extends boolean = false> = <T extends (ReturnsBuffer extends true ? Buffer : string)>(message: T, channel: T) => unknown; | ||
| //#endregion | ||
| //#region ../transport/src/parsers/types.d.ts | ||
| declare const QueryArrayFormats: readonly ["repeat", "brackets", "comma"]; | ||
| type QueryArrayFormat = (typeof QueryArrayFormats)[number]; | ||
| //#endregion | ||
| //#region ../transport/src/httpClient/types.d.ts | ||
@@ -172,4 +177,8 @@ type HttpHeaders = { | ||
| }; | ||
| type HttpQueryParamValue = { | ||
| value: string | string[]; | ||
| arrayFormat?: QueryArrayFormat; | ||
| }; | ||
| type HttpQueryParams = { | ||
| [key: string]: string; | ||
| [key: string]: string | string[] | HttpQueryParamValue; | ||
| }; | ||
@@ -265,3 +274,3 @@ declare const HttpMethods: readonly ["get", "post", "put", "delete", "patch"]; | ||
| projectSecureId?: string; | ||
| organizationId?: number; | ||
| organizationId?: number | string; | ||
| environment?: string; | ||
@@ -268,0 +277,0 @@ authConfigKey?: string; |
+1
-1
| { | ||
| "name": "@stackone/audit", | ||
| "version": "1.10.1", | ||
| "version": "1.10.2", | ||
| "description": "", | ||
@@ -5,0 +5,0 @@ "main": "dist/index.cjs", |
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
158303
0.46%