+1
-1
| /*! | ||
| * @name JavaScript/NodeJS Merge v1.1.1 | ||
| * @name JavaScript/NodeJS Merge v1.1.2 | ||
| * @author yeikos | ||
@@ -4,0 +4,0 @@ * @repository https://github.com/yeikos/js.merge |
+1
-1
@@ -1,3 +0,3 @@ | ||
| /*! JavaScript/NodeJS Merge v1.1.1 | Copyright 2013 yeikos - MIT license | https://github.com/yeikos/js.merge */ | ||
| /*! JavaScript/NodeJS Merge v1.1.2 | Copyright 2013 yeikos - MIT license | https://github.com/yeikos/js.merge */ | ||
| ;(function(e){function t(){var e=Array.prototype.slice.call(arguments),t=e.shift(),i=t===true,s=e.length,o,u,a;if(i||r(t)!=="object")t={};for(u=0;u<s;++u)if(r(o=e[u])==="object")for(a in o)t[a]=i?n(o[a]):o[a];return t}function n(e){var t=e,i=r(e),s,o;if(i==="array"){t=[];o=e.length;for(s=0;s<o;++s)t[s]=n(e[s])}else if(i==="object"){t={};for(s in e)t[s]=n(e[s])}return t}function r(e){return{}.toString.call(e).match(/\s([\w]+)/)[1].toLowerCase()}if(e){module.exports=t}else{window.merge=t}})(typeof module==="object"&&module&&typeof module.exports==="object"&&module.exports); |
+1
-1
| { | ||
| "name": "merge", | ||
| "version": "1.1.1", | ||
| "version": "1.1.2", | ||
| "author": "yeikos (http://www.yeikos.com)", | ||
@@ -6,0 +6,0 @@ "description": "JavaScript/NodeJS Merge is a tool to merge multiple objects into one object, with the possibility of create a new object cloned. His operation is very similar to the jQuery.extend function but more flexible.", |
+2
-2
@@ -1,2 +0,2 @@ | ||
| JavaScript/NodeJS Merge v1.1.1 | ||
| JavaScript/NodeJS Merge v1.1.2 | ||
| ================================================== | ||
@@ -32,3 +32,3 @@ | ||
| <script src="http://yeikos.googlecode.com/files/merge.js"></script> | ||
| <script src="http://files.yeikos.com/merge.js"></script> | ||
@@ -35,0 +35,0 @@ <script> |
+1
-1
@@ -6,3 +6,3 @@ <!DOCTYPE html><html> | ||
| <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> | ||
| <title>JavaScript/NodeJS Merge v1.1.1</title> | ||
| <title>JavaScript/NodeJS Merge v1.1.2</title> | ||
@@ -9,0 +9,0 @@ <link rel="stylesheet" href="qunit/qunit.css" /> |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
1268015
0