jquery-csv
Advanced tools
Comparing version
{ | ||
"name": "jquery-csv", | ||
"version": "0.8.8", | ||
"version": "0.8.9", | ||
"description": "A jQuery CSV parser plugin. Battle Tested | Optimized | 100% IETF RFC 4180 Complete", | ||
@@ -12,3 +12,5 @@ "author": { | ||
"chai": "^4.0", | ||
"jquery": "^3.0" | ||
"jquery": "^3.0", | ||
"tap-spec": "^4.1.1", | ||
"tape": "^4.8.0" | ||
}, | ||
@@ -21,3 +23,3 @@ "main": "src/jquery.csv.js", | ||
"test": "npm run test-node", | ||
"test-node": "npx mocha test/test.js", | ||
"test-node": "npx tape ./test/*.js | tap-spec", | ||
"clean": "npm run htmlhint && npm run semistandard", | ||
@@ -24,0 +26,0 @@ "htmlhint": "npx htmlhint --config .htmlhint examples/**/*.html", |
@@ -1,3 +0,6 @@ | ||
[](https://cdnjs.com/libraries/jquery-csv) | ||
[](https://badge.fury.io/js/jquery-csv) | ||
[](https://github.com/evanplaice/jquery-csv/releases) | ||
[](https://www.npmjs.com/package/jquery-csv) | ||
[](https://cdnjs.com/libraries/jquery-csv) | ||
[](https://david-dm.org/evanplaice/jquery-csv?type=dev) | ||
[](https://raw.githubusercontent.com/evanplaice/jquery-csv/master/LICENSE) | ||
[](https://travis-ci.org/evanplaice/jquery-csv) | ||
@@ -4,0 +7,0 @@ |
@@ -872,3 +872,3 @@ /** | ||
} | ||
output += lineValues.join(config.separator) + '\r\n'; | ||
output += lineValues.join(config.separator) + '\n'; | ||
} | ||
@@ -939,3 +939,3 @@ | ||
var propsManual = [].concat(config.manualOrder); | ||
var p; | ||
let p; | ||
for (p = 0; p < props.length; p++) { | ||
@@ -949,3 +949,3 @@ if (propsManual.indexOf(props[p]) < 0) { | ||
var o, p, line, output = [], propName; | ||
var o, p, line, output, propName; | ||
if (config.headers) { | ||
@@ -952,0 +952,0 @@ output.push(props); |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
AI-detected potential code anomaly
Supply chain riskAI has identified unusual behaviors that may pose a security risk.
Found 1 instance in 1 package
Minified code
QualityThis package contains minified code. This may be harmless in some cases where minified code is included in packaged libraries, however packages on npm should not minify code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
2
-33.33%175
1.74%0
-100%0
-100%49766
-75.16%4
100%5
-93.75%880
-42.22%