js-beautify
Advanced tools
+14
-1
@@ -66,2 +66,15 @@ #!/usr/bin/env node | ||
| }; | ||
| nopt.typeDefs.glob = { | ||
| type: "glob", | ||
| validate: function(data, key, val) { | ||
| if (typeof val === 'string' && glob.hasMagic(val)) { | ||
| // Preserve value if it contains glob magic | ||
| data[key] = val; | ||
| return true; | ||
| } else { | ||
| // Otherwise validate it as regular path | ||
| return nopt.typeDefs.path.validate(data, key, val); | ||
| } | ||
| } | ||
| }; | ||
| var path = require('path'), | ||
@@ -116,3 +129,3 @@ editorconfig = require('editorconfig'), | ||
| "help": Boolean, | ||
| "files": [path, Array], | ||
| "files": ["glob", Array], | ||
| "outfile": path, | ||
@@ -119,0 +132,0 @@ "replace": Boolean, |
+14
-1
@@ -66,2 +66,15 @@ #!/usr/bin/env node | ||
| }; | ||
| nopt.typeDefs.glob = { | ||
| type: "glob", | ||
| validate: function(data, key, val) { | ||
| if (typeof val === 'string' && glob.hasMagic(val)) { | ||
| // Preserve value if it contains glob magic | ||
| data[key] = val; | ||
| return true; | ||
| } else { | ||
| // Otherwise validate it as regular path | ||
| return nopt.typeDefs.path.validate(data, key, val); | ||
| } | ||
| } | ||
| }; | ||
| var path = require('path'), | ||
@@ -116,3 +129,3 @@ editorconfig = require('editorconfig'), | ||
| "help": Boolean, | ||
| "files": [path, Array], | ||
| "files": ["glob", Array], | ||
| "outfile": path, | ||
@@ -119,0 +132,0 @@ "replace": Boolean, |
+1
-1
| { | ||
| "name": "js-beautify", | ||
| "version": "1.14.5", | ||
| "version": "1.14.6", | ||
| "description": "beautifier.io for node", | ||
@@ -5,0 +5,0 @@ "main": "js/index.js", |
+7
-7
@@ -61,9 +61,9 @@ <p align="center"><img src="https://raw.githubusercontent.com/beautify-web/js-beautify/7db71fc/web/wordmark-light.svg" height="200px" align="center" alt="JS Beautifier"/></p> | ||
| ```html | ||
| <script src="https://cdnjs.cloudflare.com/ajax/libs/js-beautify/1.14.5/beautify.js"></script> | ||
| <script src="https://cdnjs.cloudflare.com/ajax/libs/js-beautify/1.14.5/beautify-css.js"></script> | ||
| <script src="https://cdnjs.cloudflare.com/ajax/libs/js-beautify/1.14.5/beautify-html.js"></script> | ||
| <script src="https://cdnjs.cloudflare.com/ajax/libs/js-beautify/1.14.6/beautify.js"></script> | ||
| <script src="https://cdnjs.cloudflare.com/ajax/libs/js-beautify/1.14.6/beautify-css.js"></script> | ||
| <script src="https://cdnjs.cloudflare.com/ajax/libs/js-beautify/1.14.6/beautify-html.js"></script> | ||
| <script src="https://cdnjs.cloudflare.com/ajax/libs/js-beautify/1.14.5/beautify.min.js"></script> | ||
| <script src="https://cdnjs.cloudflare.com/ajax/libs/js-beautify/1.14.5/beautify-css.min.js"></script> | ||
| <script src="https://cdnjs.cloudflare.com/ajax/libs/js-beautify/1.14.5/beautify-html.min.js"></script> | ||
| <script src="https://cdnjs.cloudflare.com/ajax/libs/js-beautify/1.14.6/beautify.min.js"></script> | ||
| <script src="https://cdnjs.cloudflare.com/ajax/libs/js-beautify/1.14.6/beautify-css.min.js"></script> | ||
| <script src="https://cdnjs.cloudflare.com/ajax/libs/js-beautify/1.14.6/beautify-html.min.js"></script> | ||
| ``` | ||
@@ -401,2 +401,2 @@ | ||
| (README.md: js-beautify@1.14.5) | ||
| (README.md: js-beautify@1.14.6) |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 4 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
AI-detected potential code anomaly
Supply chain riskAI has identified unusual behaviors that may pose a security risk.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 4 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
AI-detected potential code anomaly
Supply chain riskAI has identified unusual behaviors that may pose a security risk.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
962916
0.08%19869
0.13%