@vercel/python
Advanced tools
+4
-7
| { | ||
| "name": "@vercel/python", | ||
| "version": "6.12.0", | ||
| "version": "6.13.0", | ||
| "main": "./dist/index.js", | ||
@@ -18,5 +18,2 @@ "license": "Apache-2.0", | ||
| }, | ||
| "dependencies": { | ||
| "@vercel/python-analysis": "0.4.1" | ||
| }, | ||
| "devDependencies": { | ||
@@ -39,3 +36,4 @@ "@renovatebot/pep440": "4.2.1", | ||
| "@vercel/build-utils": "13.4.0", | ||
| "@vercel/error-utils": "2.0.3" | ||
| "@vercel/error-utils": "2.0.3", | ||
| "@vercel/python-analysis": "0.4.1" | ||
| }, | ||
@@ -48,5 +46,4 @@ "scripts": { | ||
| "vitest-run": "vitest -c ../../vitest.config.mts", | ||
| "vitest-unit": "glob --absolute 'test/unit.test.ts'", | ||
| "type-check": "tsc --noEmit" | ||
| "vitest-unit": "glob --absolute 'test/unit.test.ts'" | ||
| } | ||
| } |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 14 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 10 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
1738212
417.93%0
-100%48114
397.97%18
5.88%255
94.66%37
362.5%- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed