clean-my-mac-cli
Advanced tools
+20
-9
@@ -1360,3 +1360,3 @@ #!/usr/bin/env node | ||
| try { | ||
| await execAsync4("purge"); | ||
| await execAsync4("sudo -n purge"); | ||
| return { | ||
@@ -1366,8 +1366,18 @@ success: true, | ||
| }; | ||
| } catch (error) { | ||
| return { | ||
| success: false, | ||
| message: "Failed to free purgeable space", | ||
| error: error instanceof Error ? error.message : String(error) | ||
| }; | ||
| } catch { | ||
| try { | ||
| await execAsync4("purge"); | ||
| return { | ||
| success: true, | ||
| message: "Purgeable space freed successfully" | ||
| }; | ||
| } catch (error) { | ||
| const errorMessage = error instanceof Error ? error.message : String(error); | ||
| const needsSudo = errorMessage.includes("Operation not permitted"); | ||
| return { | ||
| success: false, | ||
| message: "Failed to free purgeable space", | ||
| error: needsSudo ? "Requires sudo. Run: sudo npx clean-my-mac-cli maintenance --purgeable" : errorMessage | ||
| }; | ||
| } | ||
| } | ||
@@ -1399,5 +1409,6 @@ } | ||
| } else { | ||
| spinner.fail(chalk4.red(result.message)); | ||
| if (result.error) { | ||
| console.log(chalk4.dim(` ${result.error}`)); | ||
| spinner.fail(chalk4.red(`${result.message}: ${result.error}`)); | ||
| } else { | ||
| spinner.fail(chalk4.red(result.message)); | ||
| } | ||
@@ -1404,0 +1415,0 @@ } |
+2
-2
| { | ||
| "name": "clean-my-mac-cli", | ||
| "version": "1.1.3", | ||
| "version": "1.1.4", | ||
| "description": "Open source CLI tool to clean your Mac - similar to CleanMyMac", | ||
@@ -50,3 +50,3 @@ "type": "module", | ||
| "@eslint/js": "^9.28.0", | ||
| "@types/node": "^20.10.0", | ||
| "@types/node": "^24.10.1", | ||
| "@vitest/coverage-v8": "^4.0.15", | ||
@@ -53,0 +53,0 @@ "eslint": "^9.28.0", |
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 2 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 2 instances in 1 package
69520
0.6%1811
0.61%