jest
Advanced tools
Comparing version 0.0.89 to 0.0.90
@@ -145,3 +145,3 @@ var _ = require('underscore'), | ||
return field.usages; | ||
}).flatten().union([schema.url,schema.sorting]).value(); | ||
}).flatten().push(schema.url).push(schema.sorting).value(); | ||
}, | ||
@@ -148,0 +148,0 @@ put_usage : function(schema) |
{ | ||
"name":"jest", | ||
"description":"JavaScriptational State Transfer. JS restful API layer with Mongoose based resources. Inspired by python Tastypie", | ||
"version":"0.0.89", | ||
"version":"0.0.90", | ||
"author":"Ishai Jaffe <ishai@empeeric.com>", | ||
@@ -6,0 +6,0 @@ "contributors": [ |
@@ -78,3 +78,6 @@ var _ = require('underscore'), | ||
if(typeof(filters) == 'string' || typeof(sorts) == 'string') | ||
{ | ||
callback({code:400,message:filters}); | ||
return; | ||
} | ||
var offset = Number(req.query['offset'] || 0); | ||
@@ -337,3 +340,3 @@ var limit = Number(req.query['limit'] || self.default_limit || self.settings.DEFAULT_LIMIT); | ||
get_update_tree:function (req) { | ||
var fields = req.jest_update_fields || this.udate_fields; | ||
var fields = req.jest_update_fields || this.update_fields; | ||
return this.make_field_tree(fields); | ||
@@ -728,3 +731,3 @@ }, | ||
{ | ||
if(field in tree || !tree_empty) | ||
if(!tree_empty || field in tree) | ||
{ | ||
@@ -731,0 +734,0 @@ if(!exclude_tree_empty || !(field in exclude_tree)) |
Install scripts
Supply chain riskInstall scripts are run when the package is installed. The majority of malware in npm is hidden in install scripts.
Found 2 instances in 1 package
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 3 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses eval() which is a dangerous function. This prevents the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 9 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
SPDX disjunction
LicenseSPDX disjunction for an artifact's license information
Found 1 instance in 1 package
Mixed license
License(Experimental) Package contains multiple licenses.
Found 1 instance in 1 package
Unidentified License
License(Experimental) Something that seems like a license was found, but its contents could not be matched with a known license
Found 1 instance in 1 package
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
SPDX disjunction
LicenseSPDX disjunction for an artifact's license information
Found 1 instance in 1 package
No License Found
License(Experimental) License information could not be found
Found 1 instance in 1 package
4453205
306
35060
3
80
2
249
24