decaffeinate-coffeescript
Advanced tools
| // Generated by CoffeeScript 1.10.0 | ||
| (function() { | ||
| var Lexer, SourceMap, base, compile, ext, formatSourcePosition, fs, getSourceMap, helpers, i, len, lexer, parser, path, ref, sourceMaps, vm, withPrettyErrors, | ||
| hasProp = {}.hasOwnProperty, | ||
| indexOf = [].indexOf || function(item) { for (var i = 0, l = this.length; i < l; i++) { if (i in this && this[i] === item) return i; } return -1; }; | ||
| var Lexer, SourceMap, base, compile, ext, formatSourcePosition, fs, helpers, i, len, lexer, parser, path, ref, vm, withPrettyErrors, | ||
| hasProp = {}.hasOwnProperty; | ||
@@ -333,45 +332,2 @@ fs = require('fs'); | ||
| sourceMaps = {}; | ||
| getSourceMap = function(filename) { | ||
| var answer, ref1; | ||
| if (sourceMaps[filename]) { | ||
| return sourceMaps[filename]; | ||
| } | ||
| if (ref1 = path != null ? path.extname(filename) : void 0, indexOf.call(exports.FILE_EXTENSIONS, ref1) < 0) { | ||
| return; | ||
| } | ||
| answer = exports._compileFile(filename, true); | ||
| return sourceMaps[filename] = answer.sourceMap; | ||
| }; | ||
| Error.prepareStackTrace = function(err, stack) { | ||
| var frame, frames, getSourceMapping; | ||
| getSourceMapping = function(filename, line, column) { | ||
| var answer, sourceMap; | ||
| sourceMap = getSourceMap(filename); | ||
| if (sourceMap) { | ||
| answer = sourceMap.sourceLocation([line - 1, column - 1]); | ||
| } | ||
| if (answer) { | ||
| return [answer[0] + 1, answer[1] + 1]; | ||
| } else { | ||
| return null; | ||
| } | ||
| }; | ||
| frames = (function() { | ||
| var j, len1, results; | ||
| results = []; | ||
| for (j = 0, len1 = stack.length; j < len1; j++) { | ||
| frame = stack[j]; | ||
| if (frame.getFunction() === exports.run) { | ||
| break; | ||
| } | ||
| results.push(" at " + (formatSourcePosition(frame, getSourceMapping))); | ||
| } | ||
| return results; | ||
| })(); | ||
| return (err.toString()) + "\n" + (frames.join('\n')) + "\n"; | ||
| }; | ||
| }).call(this); |
+1
-1
@@ -11,3 +11,3 @@ { | ||
| "author": "Jeremy Ashkenas", | ||
| "version": "1.10.0-patch22", | ||
| "version": "1.10.0-patch23", | ||
| "license": "MIT", | ||
@@ -14,0 +14,0 @@ "engines": { |
Sorry, the diff of this file is too big to display
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 3 instances in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 3 instances in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
466562
-9.81%8755
-0.47%