+2
-2
| { | ||
| "name": "bd-load", | ||
| "version": "2.0.0", | ||
| "version": "2.0.2", | ||
| "description": "A small and fast AMD loader for building modern applications on node.js and the browser.", | ||
@@ -22,3 +22,3 @@ "main": "load.js", | ||
| ], | ||
| "homepage": "https://github.com/altoviso/bdLoad", | ||
| "homepage": "https://github.com/altoviso/bd-load", | ||
| "ignore": [ | ||
@@ -25,0 +25,0 @@ "**/.*", |
+14
-3
| { | ||
| "name": "bd-load", | ||
| "version": "2.0.0", | ||
| "version": "2.0.2", | ||
| "description": "A small and fast AMD loader for building modern applications on node.js and the browser.", | ||
@@ -23,8 +23,19 @@ "homepage": "http://github.com/altoviso/bd-load", | ||
| "type": "BSD", | ||
| "url": "https://github.com/altoviso/bdLoad/blob/master/LICENSE.txt" | ||
| "url": "https://github.com/altoviso/bd-load/blob/master/LICENSE.txt" | ||
| } | ||
| ], | ||
| "keywords": ["JavaScript", "bd-load", "bdload", "AMD", "backdraft", "AsynchronousDefinition", "commonjs", "node", "Dojo", "Toolkit"], | ||
| "keywords": [ | ||
| "JavaScript", | ||
| "bd-load", | ||
| "bdload", | ||
| "AMD", | ||
| "backdraft", | ||
| "AsynchronousDefinition", | ||
| "commonjs", | ||
| "node", | ||
| "Dojo", | ||
| "Toolkit" | ||
| ], | ||
| "author": "Rawld Gill <rgill@altoviso.com> (http://altoviso.com/)", | ||
| "license": "BSD-3-Clause" | ||
| } |
+3
-3
@@ -50,3 +50,3 @@ # bd-load | ||
| ``` | ||
| npm install -D bd-smoke | ||
| npm install bd-load | ||
| ``` | ||
@@ -57,3 +57,3 @@ | ||
| ``` | ||
| yarn add bd-smoke | ||
| yarn add bd-load | ||
| ``` | ||
@@ -64,3 +64,3 @@ | ||
| ``` | ||
| bower install --save bd-smoke | ||
| bower install --save bd-load | ||
| ``` | ||
@@ -67,0 +67,0 @@ |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
37288
0.08%