@vaadin/charts
Advanced tools
+8
-8
| { | ||
| "name": "@vaadin/charts", | ||
| "version": "24.10.1", | ||
| "version": "24.10.2", | ||
| "publishConfig": { | ||
@@ -40,6 +40,6 @@ "access": "public" | ||
| "@polymer/polymer": "^3.0.0", | ||
| "@vaadin/component-base": "~24.10.1", | ||
| "@vaadin/vaadin-lumo-styles": "~24.10.1", | ||
| "@vaadin/vaadin-material-styles": "~24.10.1", | ||
| "@vaadin/vaadin-themable-mixin": "~24.10.1", | ||
| "@vaadin/component-base": "~24.10.2", | ||
| "@vaadin/vaadin-lumo-styles": "~24.10.2", | ||
| "@vaadin/vaadin-material-styles": "~24.10.2", | ||
| "@vaadin/vaadin-themable-mixin": "~24.10.2", | ||
| "highcharts": "9.2.2", | ||
@@ -49,4 +49,4 @@ "lit": "^3.0.0" | ||
| "devDependencies": { | ||
| "@vaadin/chai-plugins": "~24.10.1", | ||
| "@vaadin/test-runner-commands": "~24.10.1", | ||
| "@vaadin/chai-plugins": "~24.10.2", | ||
| "@vaadin/test-runner-commands": "~24.10.2", | ||
| "@vaadin/testing-helpers": "^1.1.0", | ||
@@ -60,3 +60,3 @@ "sinon": "^18.0.0" | ||
| ], | ||
| "gitHead": "ba15070c7b56bf927b68a2d05de42d9fa0918974" | ||
| "gitHead": "2b15518bfce328f7ff4dbedc690818862d7c59c8" | ||
| } |
+1
-1
| { | ||
| "$schema": "https://json.schemastore.org/web-types", | ||
| "name": "@vaadin/charts", | ||
| "version": "24.10.1", | ||
| "version": "24.10.2", | ||
| "description-markup": "markdown", | ||
@@ -6,0 +6,0 @@ "contributions": { |
| { | ||
| "$schema": "https://json.schemastore.org/web-types", | ||
| "name": "@vaadin/charts", | ||
| "version": "24.10.1", | ||
| "version": "24.10.2", | ||
| "description-markup": "markdown", | ||
@@ -6,0 +6,0 @@ "framework": "lit", |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package