@vercel/node
Advanced tools
+3
-3
| { | ||
| "name": "@vercel/node", | ||
| "version": "1.13.1-canary.8", | ||
| "version": "1.13.1-canary.9", | ||
| "license": "MIT", | ||
@@ -35,3 +35,3 @@ "main": "./dist/index", | ||
| "@types/test-listen": "1.1.0", | ||
| "@vercel/build-utils": "2.14.1-canary.7", | ||
| "@vercel/build-utils": "2.14.1-canary.8", | ||
| "@vercel/ncc": "0.24.0", | ||
@@ -47,3 +47,3 @@ "@vercel/nft": "0.17.5", | ||
| }, | ||
| "gitHead": "34055e3599376144629c1d1efb0ce5b4deb6c675" | ||
| "gitHead": "451e0b0cfb7f5f3e0e4f37642471b2c7b4284649" | ||
| } |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package