Comparing version 0.2.0 to 0.2.1
{ | ||
"name": "aolog", | ||
"version": "0.2.0", | ||
"version": "0.2.1", | ||
"description": "Append only log", | ||
@@ -12,3 +12,7 @@ "main": "index.js", | ||
}, | ||
"scripts": { | ||
"build": "./node_modules/.bin/browserify -s AOlog -e ./index.js > ipfsapi.min.js" | ||
}, | ||
"devDependencies": { | ||
"browserify": "^11.0.1", | ||
"d3": "^3.5.6" | ||
@@ -15,0 +19,0 @@ }, |
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
745821
9
21339
2
4
2