browser-http
Advanced tools
@@ -16,3 +16,3 @@ (function() { | ||
| Redirect.prototype.success = function(response) { | ||
| if (typeof response.data.redirect !== 'undefined') { | ||
| if (response.data !== null && typeof response.data.redirect !== 'undefined') { | ||
| return window.location.href = response.data.redirect; | ||
@@ -19,0 +19,0 @@ } |
@@ -27,3 +27,3 @@ (function() { | ||
| var el, html, id, ref, results; | ||
| if (typeof response.data.snippets !== 'undefined') { | ||
| if (response.data !== null && typeof response.data.snippets !== 'undefined') { | ||
| ref = response.data.snippets; | ||
@@ -30,0 +30,0 @@ results = []; |
+1
-1
| { | ||
| "name": "browser-http", | ||
| "description": "Simple (but advanced) HTTP for browser", | ||
| "version": "4.0.1", | ||
| "version": "4.0.2", | ||
| "author": { | ||
@@ -6,0 +6,0 @@ "name": "David Kudera", |
+5
-1
@@ -39,3 +39,3 @@ [](https://www.npmjs.com/package/browser-http) | ||
| } else { | ||
| throw e; // some error occurred | ||
| throw err; // some error occurred | ||
| } | ||
@@ -338,2 +338,6 @@ }); | ||
| * 4.0.2 | ||
| + Removed from bower... | ||
| + Bug with redirect and snippets extensions when there were no data in response | ||
| * 4.0.1 | ||
@@ -340,0 +344,0 @@ + Updated dependencies |
-14
| { | ||
| "name": "browser-http", | ||
| "version": "4.0.1", | ||
| "keywords": ["http", "client", "browser", "ajax", "url"], | ||
| "main": "./dist/http.js", | ||
| "ignore": [ | ||
| "**/.*", | ||
| ".idea", | ||
| "node_modules", | ||
| "npm-debug.log", | ||
| "test", | ||
| "src" | ||
| ] | ||
| } |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
447
0.9%71647
-0.08%26
-3.7%1613
-0.86%