eslint-plugin-react-web-api
Advanced tools
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
AI-detected possible typosquat
Supply chain riskThere is a package with a similar name that is downloaded much more often.
Did you mean |
---|
callsite |
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 7 instances in 7 packages
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 11 instances in 11 packages
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 11 instances in 11 packages
Unmaintained
MaintenancePackage has not been updated in more than 5 years and may be unmaintained. Problems with the package may go unaddressed.
Found 17 instances in 17 packages
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 2 instances in 2 packages
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 4 instances in 4 packages