@vitest/snapshot
Advanced tools
| import { promises, existsSync } from 'node:fs'; | ||
| import { resolve, isAbsolute, dirname, join, basename } from 'pathe'; | ||
| import { isAbsolute, resolve, dirname, join, basename } from 'pathe'; | ||
@@ -4,0 +4,0 @@ class NodeSnapshotEnvironment { |
+2
-1
@@ -286,2 +286,3 @@ import { resolve } from 'pathe'; | ||
| /__vitest_browser__/, | ||
| "/@id/__x00__vitest/browser", | ||
| /\/deps\/vitest_/ | ||
@@ -404,3 +405,3 @@ ]; | ||
| if (method) { | ||
| method = method.replace(/__vite_ssr_import_\d+__\./g, "").replace(/(Object\.)?__vite_ssr_export_default__\s?/g, ""); | ||
| method = method.replace(/\(0\s?,\s?__vite_ssr_import_\d+__.(\w+)\)/g, "$1").replace(/__(vite_ssr_import|vi_import)_\d+__\./g, "").replace(/(Object\.)?__vite_ssr_export_default__\s?/g, ""); | ||
| } | ||
@@ -407,0 +408,0 @@ return { |
+1
-1
@@ -1,2 +0,2 @@ | ||
| import { join, dirname, basename, resolve, isAbsolute } from 'pathe'; | ||
| import { join, dirname, basename, isAbsolute, resolve } from 'pathe'; | ||
@@ -3,0 +3,0 @@ class SnapshotManager { |
+3
-3
| { | ||
| "name": "@vitest/snapshot", | ||
| "type": "module", | ||
| "version": "4.1.0-beta.2", | ||
| "version": "4.1.0-beta.3", | ||
| "description": "Vitest snapshot manager", | ||
@@ -43,3 +43,3 @@ "license": "MIT", | ||
| "pathe": "^2.0.3", | ||
| "@vitest/pretty-format": "4.1.0-beta.2" | ||
| "@vitest/pretty-format": "4.1.0-beta.3" | ||
| }, | ||
@@ -49,3 +49,3 @@ "devDependencies": { | ||
| "natural-compare": "^1.4.0", | ||
| "@vitest/utils": "4.1.0-beta.2" | ||
| "@vitest/utils": "4.1.0-beta.3" | ||
| }, | ||
@@ -52,0 +52,0 @@ "scripts": { |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
63135
0.16%1758
0.06%+ Added
- Removed