@vercel/python
Advanced tools
+2
-2
| { | ||
| "name": "@vercel/python", | ||
| "version": "5.0.7", | ||
| "version": "5.0.8", | ||
| "main": "./dist/index.js", | ||
@@ -23,3 +23,3 @@ "license": "Apache-2.0", | ||
| "@types/which": "3.0.0", | ||
| "@vercel/build-utils": "12.1.0", | ||
| "@vercel/build-utils": "12.1.2", | ||
| "cross-env": "7.0.3", | ||
@@ -26,0 +26,0 @@ "execa": "^1.0.0", |
+9
-4
@@ -437,2 +437,4 @@ from __future__ import annotations | ||
| response_done = threading.Event() | ||
| # Event to signal the ASGI app has fully completed (incl. background tasks) | ||
| app_done = threading.Event() | ||
@@ -492,2 +494,4 @@ # Propagate request context to background thread for logging & metrics | ||
| await asgi_instance | ||
| # Mark app completion when the ASGI callable returns | ||
| app_done.set() | ||
@@ -509,6 +513,5 @@ asyncio.run(runner()) | ||
| # Always unblock the waiting thread to avoid hangs | ||
| try: | ||
| response_done.set() | ||
| except Exception: | ||
| pass | ||
| response_done.set() | ||
| # Ensure app completion is always signaled | ||
| app_done.set() | ||
| if token is not None: | ||
@@ -523,2 +526,4 @@ storage.reset(token) | ||
| response_done.wait() | ||
| # Also wait until the ASGI app finishes (includes background tasks) | ||
| app_done.wait() | ||
@@ -525,0 +530,0 @@ if 'Handler' in locals(): |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 9 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
AI-detected potential code anomaly
Supply chain riskAI has identified unusual behaviors that may pose a security risk.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 9 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
314081
1.58%8715
1.48%114
0.88%