@vercel/node
Advanced tools
+3
-3
| { | ||
| "name": "@vercel/node", | ||
| "version": "1.15.1-canary.2", | ||
| "version": "1.15.1-canary.3", | ||
| "license": "MIT", | ||
@@ -47,3 +47,3 @@ "main": "./dist/index", | ||
| "@types/test-listen": "1.1.0", | ||
| "@vercel/build-utils": "2.16.1-canary.2", | ||
| "@vercel/build-utils": "2.16.1-canary.3", | ||
| "@vercel/ncc": "0.24.0", | ||
@@ -59,3 +59,3 @@ "@vercel/nft": "0.18.1", | ||
| }, | ||
| "gitHead": "d91bca7d6bc8066690c0db4b11990a354d13ebbd" | ||
| "gitHead": "41d66661399754aed76a655c92f28c19afd0e8f1" | ||
| } |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package