itheima-cli
Advanced tools
+1
-1
| { | ||
| "name": "itheima-cli", | ||
| "version": "1.0.9", | ||
| "version": "1.0.10", | ||
| "author": "itheima", | ||
@@ -5,0 +5,0 @@ "license": "MIT", |
+17
-11
| # IT 黑马脚手架工具 | ||
|  | ||
|  | ||
@@ -11,10 +11,2 @@ ## 设计目标 | ||
| ## 感谢 | ||
| 本项目参考了以下开源项目,在详细阅读了开源代码的基础上,在考虑普遍适用性为基础进行开发。 | ||
| * [vue脚手架](https://github.com/vuejs/vue-cli) | ||
| * [蚂蚁金服dva](https://github.com/dvajs/dva) | ||
| * [create-react-app](https://github.com/facebook/create-react-app) | ||
| ## 安装 | ||
@@ -61,2 +53,6 @@ | ||
| ## 运行演示 | ||
| [](https://asciinema.org/a/nOBpgtncyuPtGCkguvIuKxoYx) | ||
| ## 自定义模板 | ||
@@ -314,3 +310,3 @@ | ||
| 列子: | ||
| 示例: | ||
@@ -325,3 +321,3 @@ 安装 [`1.0` branch](https://github.com/itheima2017/itheimaAdmin-template/dev/1.0) of the webpack-simple vue template: | ||
| ### 一份完整的例子 | ||
| ### 一份完整的示例 | ||
@@ -416,6 +412,16 @@ 模板根目录下 [meta.js](https://github.com/itheima2017/itheimaAdmin-template/blob/master/meta.js) | ||
| ## 感谢 | ||
| 本项目参考了以下开源项目,在详细阅读了开源代码的基础上,在考虑普遍适用性为基础进行开发。 | ||
| * [vue脚手架](https://github.com/vuejs/vue-cli) | ||
| * [蚂蚁金服dva](https://github.com/dvajs/dva) | ||
| * [create-react-app](https://github.com/facebook/create-react-app) | ||
| ## 版权 | ||
| [MIT](https://opensource.org/licenses/MIT) | ||
| @传智研究院-研发部 | ||
| 江苏传智播客教育科技股份有限公司 版权所有 Copyright 2006-2018, All Rights Reserved |
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
28786
0.6%423
1.44%