jest-junit
Advanced tools
+1
-1
| { | ||
| "name": "jest-junit", | ||
| "version": "14.0.1", | ||
| "version": "15.0.0", | ||
| "description": "A jest reporter that generates junit xml files", | ||
@@ -5,0 +5,0 @@ "main": "index.js", |
@@ -77,3 +77,3 @@ 'use strict'; | ||
| testCase.testcase.push({ | ||
| [tagName]: stripAnsi(failure) | ||
| [tagName]: strip(failure) | ||
| }); | ||
@@ -106,2 +106,7 @@ }) | ||
| // Strips escape codes for readability and illegal XML characters to produce valid output. | ||
| const strip = function (str) { | ||
| return stripAnsi(str).replace(/\u001b/g, ''); | ||
| } | ||
| module.exports = function (report, appDirectory, options, rootDir = null) { | ||
@@ -108,0 +113,0 @@ // Check if there is a junitProperties.js (or whatever they called it) |
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
38809
0.44%459
0.88%