@vercel/node
Advanced tools
+2
-2
| { | ||
| "name": "@vercel/node", | ||
| "version": "1.15.2-canary.0", | ||
| "version": "1.15.2-canary.1", | ||
| "license": "MIT", | ||
@@ -58,3 +58,3 @@ "main": "./dist/index", | ||
| }, | ||
| "gitHead": "4c20218e05122c439e5fa4f4997e9c5a5c7a93e2" | ||
| "gitHead": "6e5e700e8d967914574bf7952ed3995a25022f50" | ||
| } |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package