@vercel/node
Advanced tools
+15
-4
| { | ||
| "name": "@vercel/node", | ||
| "version": "1.15.1-canary.1", | ||
| "version": "1.15.1-canary.2", | ||
| "license": "MIT", | ||
@@ -15,3 +15,3 @@ "main": "./dist/index", | ||
| "test-integration-once": "jest --env node --verbose --runInBand --bail test/integration.test.js", | ||
| "test-unit": "jest --env node --verbose --bail test/prepare-cache.test.js", | ||
| "test-unit": "jest --env node --verbose --bail test/prepare-cache.test.ts", | ||
| "prepublishOnly": "node build" | ||
@@ -22,3 +22,14 @@ }, | ||
| ], | ||
| "jest": { | ||
| "preset": "ts-jest", | ||
| "testEnvironment": "node", | ||
| "globals": { | ||
| "ts-jest": { | ||
| "diagnostics": true, | ||
| "isolatedModules": true | ||
| } | ||
| } | ||
| }, | ||
| "dependencies": { | ||
| "@types/jest": "27.4.1", | ||
| "@types/node": "*", | ||
@@ -38,3 +49,3 @@ "@vercel/node-bridge": "2.2.1", | ||
| "@types/test-listen": "1.1.0", | ||
| "@vercel/build-utils": "2.16.1-canary.1", | ||
| "@vercel/build-utils": "2.16.1-canary.2", | ||
| "@vercel/ncc": "0.24.0", | ||
@@ -50,3 +61,3 @@ "@vercel/nft": "0.18.1", | ||
| }, | ||
| "gitHead": "f88c862e9d9d4ad385e54d5fecaa0306a6ed5612" | ||
| "gitHead": "d91bca7d6bc8066690c0db4b11990a354d13ebbd" | ||
| } |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
3122001
0.01%5
25%+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added