@@ -78,3 +78,7 @@ import {ChildProcess} from 'node:child_process'; | ||
| const nextRawCharacter = rawTemplate[rawIndex + 1]; | ||
| if (nextRawCharacter === 'u' && rawTemplate[rawIndex + 2] === '{') { | ||
| if (nextRawCharacter === '\n') { | ||
| // Handles escaped newlines in templates | ||
| templateIndex -= 1; | ||
| rawIndex += 1; | ||
| } else if (nextRawCharacter === 'u' && rawTemplate[rawIndex + 2] === '{') { | ||
| rawIndex = rawTemplate.indexOf('}', rawIndex + 3); | ||
@@ -81,0 +85,0 @@ } else { |
+1
-1
| { | ||
| "name": "execa", | ||
| "version": "9.5.1", | ||
| "version": "9.5.2", | ||
| "description": "Process execution for humans", | ||
@@ -5,0 +5,0 @@ "license": "MIT", |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
324196
0.04%7842
0.05%