@storybook/test
Advanced tools
+5
-5
| { | ||
| "name": "@storybook/test", | ||
| "version": "7.6.22", | ||
| "version": "7.6.23", | ||
| "description": "", | ||
@@ -46,6 +46,6 @@ "keywords": [ | ||
| "dependencies": { | ||
| "@storybook/client-logger": "7.6.22", | ||
| "@storybook/core-events": "7.6.22", | ||
| "@storybook/instrumenter": "7.6.22", | ||
| "@storybook/preview-api": "7.6.22", | ||
| "@storybook/client-logger": "7.6.23", | ||
| "@storybook/core-events": "7.6.23", | ||
| "@storybook/instrumenter": "7.6.23", | ||
| "@storybook/preview-api": "7.6.23", | ||
| "@testing-library/dom": "^9.3.1", | ||
@@ -52,0 +52,0 @@ "@testing-library/jest-dom": "^6.1.3", |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed