babel-plugin-angularjs-annotate
Advanced tools
Comparing version 0.5.2 to 0.5.3
# babel-plugin-angularjs-annotate changelog | ||
## v0.5.3 2016-10-14 | ||
* bugfix: fix error when re-annotating existing array | ||
## v0.5.2 2016-09-28 | ||
@@ -4,0 +7,0 @@ * bugfix: fix crash on illegal component declaration (#11) |
@@ -375,3 +375,4 @@ // nginject.js | ||
// last should be a function expression | ||
if (elements.length === 0 || !isFunctionExpressionOrArrow(last(elements))) { | ||
let fn = elements.slice(-1)[0]; | ||
if (elements.length === 0 || !isFunctionExpressionOrArrow(fn)) { | ||
return false; | ||
@@ -378,0 +379,0 @@ } |
{ | ||
"name": "babel-plugin-angularjs-annotate", | ||
"version": "0.5.2", | ||
"version": "0.5.3", | ||
"description": "Babel plugin to add angularjs dependency injection annotations", | ||
@@ -18,2 +18,4 @@ "main": "babel-ng-annotate.js", | ||
"babel-preset-es2015": "^6.9.0", | ||
"babelify": "^7.3.0", | ||
"browserify": "^13.1.0", | ||
"chalk": "^1.1.1", | ||
@@ -23,3 +25,4 @@ "diff": "^2.2.3", | ||
"tap-xunit": "^1.4.0", | ||
"tape": "^4.6.0" | ||
"tape": "^4.6.0", | ||
"watchify": "^3.7.0" | ||
}, | ||
@@ -39,3 +42,6 @@ "keywords": [ | ||
"scripts": { | ||
"test": "node --harmony tests/tests.js | tap-xunit" | ||
"lint": "eslint *.js", | ||
"test": "node --harmony tests/tests.js | tap-xunit", | ||
"watch": "watchify docs/repl.js -o docs/repl-browser.js -t babelify --presets es2015", | ||
"build-site": "browserify docs/repl.js -o docs/repl-browser.js -t babelify --presets es2015" | ||
}, | ||
@@ -42,0 +48,0 @@ "author": "Andrew Schmadel", |
@@ -190,4 +190,16 @@ module.exports = { | ||
} | ||
}, | ||
{ | ||
name: "existing array with annotation", | ||
input: function(){ | ||
g(["a", "b", function(a, b) { | ||
"ngInject" | ||
}]); | ||
}, expected: function(){ | ||
g(["a", "b", function(a, b) { | ||
"ngInject" | ||
}]) | ||
} | ||
} | ||
] | ||
} |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 4 instances in 1 package
High entropy strings
Supply chain riskContains high entropy strings. This could be a sign of encrypted data, leaked secrets or obfuscated code.
Found 1 instance in 1 package
1864437
46
50132
10
13
9