+1
-1
| { | ||
| "name": "bonzo" | ||
| , "description": "Library agnostic, extensible DOM utility" | ||
| , "version": "1.3.4" | ||
| , "version": "1.3.5" | ||
| , "homepage": "https://github.com/ded/bonzo" | ||
@@ -6,0 +6,0 @@ , "author": "Dustin Diaz <dustin@dustindiaz.com> (http://dustindiaz.com)" |
+1
-1
@@ -932,3 +932,3 @@ (function (name, context, definition) { | ||
| , val: function (s) { | ||
| return (typeof s == 'string') ? | ||
| return (typeof s == 'string' || typeof s == 'number') ? | ||
| this.attr('value', s) : | ||
@@ -935,0 +935,0 @@ this.length ? this[0].value : null |
@@ -124,3 +124,3 @@ /*global sink:true start:true Q:true dom:true $:true bowser:true ender:true*/ | ||
| test('setting & getting attributes', 10, function () { | ||
| test('setting & getting attributes', function (done) { | ||
| ok($('a#twitter').attr('href') == 'http://twitter.com/', 'retrieves "href" attribute from anchor') | ||
@@ -141,2 +141,6 @@ ok($('a#hrefrel').attr('href') == '/relative', 'retrieves relative "href" attribute from anchor') | ||
| ok(input.val() == 'eyoeyo', 'val(val) can set value on input') | ||
| input.val(1234) | ||
| ok(input.val() == '1234', 'val(val) can set number value on input') | ||
| done() | ||
| }) | ||
@@ -143,0 +147,0 @@ |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
379351
0.03%8123
0.04%